Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-3639 (GCVE-0-2018-3639)
Vulnerability from cvelistv5 – Published: 2018-05-22 12:00 – Updated: 2024-09-16 22:55- Information Disclosure
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Multiple |
Affected:
Multiple
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T04:50:30.281Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2018:1689",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"name": "RHSA-2018:2162",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"name": "RHSA-2018:1641",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"name": "USN-3680-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"name": "RHSA-2018:1997",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"name": "RHSA-2018:1665",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"name": "RHSA-2018:3407",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"name": "RHSA-2018:2164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "RHSA-2018:2001",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"name": "RHSA-2018:3423",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"name": "RHSA-2018:2003",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"name": "USN-3654-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"name": "RHSA-2018:1645",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"name": "RHSA-2018:1643",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"name": "RHSA-2018:1652",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"name": "RHSA-2018:3424",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"name": "RHSA-2018:3402",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"name": "TA18-141A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"name": "RHSA-2018:1656",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"name": "RHSA-2018:1664",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"name": "RHSA-2018:2258",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"name": "RHSA-2018:1688",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"name": "RHSA-2018:1658",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"name": "RHSA-2018:1657",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"name": "RHSA-2018:2289",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"name": "RHSA-2018:1666",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"name": "1042004",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:1675",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"name": "RHSA-2018:1660",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"name": "RHSA-2018:1965",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"name": "RHSA-2018:1661",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"name": "RHSA-2018:1633",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"name": "RHSA-2018:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"name": "RHSA-2018:1854",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"name": "RHSA-2018:2006",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"name": "RHSA-2018:2250",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"name": "1040949",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040949"
},
{
"name": "RHSA-2018:3401",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"name": "RHSA-2018:1737",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"name": "RHSA-2018:1826",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"name": "USN-3651-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"name": "DSA-4210",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"name": "44695",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"name": "RHSA-2018:1651",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"name": "RHSA-2018:1638",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"name": "RHSA-2018:1696",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"name": "RHSA-2018:2246",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"name": "RHSA-2018:1644",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"name": "RHSA-2018:1646",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name": "RHSA-2018:1639",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"name": "RHSA-2018:1668",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"name": "RHSA-2018:1637",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"name": "RHSA-2018:2948",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "VU#180049",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "RHSA-2018:1686",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"name": "RHSA-2018:2172",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"name": "RHSA-2018:1663",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"name": "USN-3652-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"name": "RHSA-2018:1629",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"name": "RHSA-2018:1655",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"name": "RHSA-2018:1640",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"name": "RHSA-2018:1669",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"name": "RHSA-2018:1676",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"name": "RHSA-2018:3425",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"name": "RHSA-2018:2363",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"name": "RHSA-2018:1632",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"name": "RHSA-2018:1650",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"name": "RHSA-2018:2396",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name": "RHSA-2018:2364",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"name": "USN-3653-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"name": "RHSA-2018:2216",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"name": "USN-3655-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"name": "RHSA-2018:1649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"name": "RHSA-2018:2309",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"name": "104232",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104232"
},
{
"name": "RHSA-2018:1653",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"name": "RHSA-2018:2171",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"name": "RHSA-2018:1635",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "RHSA-2018:2394",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name": "RHSA-2018:1710",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"name": "RHSA-2018:1659",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"name": "RHSA-2018:1711",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"name": "DSA-4273",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"name": "RHSA-2018:1738",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"name": "RHSA-2018:1674",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"name": "RHSA-2018:3396",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"name": "RHSA-2018:1667",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"name": "USN-3654-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"name": "RHSA-2018:1662",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"name": "RHSA-2018:1630",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"name": "RHSA-2018:1647",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"name": "RHSA-2018:1967",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"name": "USN-3655-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"name": "RHSA-2018:3399",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"name": "RHSA-2018:2060",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"name": "RHSA-2018:1690",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"name": "USN-3653-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"name": "RHSA-2018:2161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"name": "RHSA-2018:2328",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"name": "RHSA-2018:1648",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"name": "RHSA-2018:2387",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name": "RHSA-2019:0148",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"name": "RHSA-2018:1654",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"name": "USN-3679-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"name": "USN-3777-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "RHSA-2018:1642",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"name": "RHSA-2018:3397",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "USN-3756-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name": "RHSA-2018:3398",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"name": "RHSA-2018:3400",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"name": "RHSA-2018:2228",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"name": "RHSA-2019:1046",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"name": "openSUSE-SU-2019:1439",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"name": "openSUSE-SU-2019:1438",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX235225"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"name": "openSUSE-SU-2020:1325",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Multiple",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "Multiple"
}
]
}
],
"datePublic": "2018-05-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information Disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-02T20:06:27",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "RHSA-2018:1689",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"name": "RHSA-2018:2162",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"name": "RHSA-2018:1641",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"name": "USN-3680-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"name": "RHSA-2018:1997",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"name": "RHSA-2018:1665",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"name": "RHSA-2018:3407",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"name": "RHSA-2018:2164",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "RHSA-2018:2001",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"name": "RHSA-2018:3423",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"name": "RHSA-2018:2003",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"name": "USN-3654-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"name": "RHSA-2018:1645",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"name": "RHSA-2018:1643",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"name": "RHSA-2018:1652",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"name": "RHSA-2018:3424",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"name": "RHSA-2018:3402",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"name": "TA18-141A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"name": "RHSA-2018:1656",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"name": "RHSA-2018:1664",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"name": "RHSA-2018:2258",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"name": "RHSA-2018:1688",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"name": "RHSA-2018:1658",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"name": "RHSA-2018:1657",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"name": "RHSA-2018:2289",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"name": "RHSA-2018:1666",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"name": "1042004",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:1675",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"name": "RHSA-2018:1660",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"name": "RHSA-2018:1965",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"name": "RHSA-2018:1661",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"name": "RHSA-2018:1633",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"name": "RHSA-2018:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"name": "RHSA-2018:1854",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"name": "RHSA-2018:2006",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"name": "RHSA-2018:2250",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"name": "1040949",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040949"
},
{
"name": "RHSA-2018:3401",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"name": "RHSA-2018:1737",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"name": "RHSA-2018:1826",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"name": "USN-3651-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"name": "DSA-4210",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"name": "44695",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"name": "RHSA-2018:1651",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"name": "RHSA-2018:1638",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"name": "RHSA-2018:1696",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"name": "RHSA-2018:2246",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"name": "RHSA-2018:1644",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"name": "RHSA-2018:1646",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name": "RHSA-2018:1639",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"name": "RHSA-2018:1668",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"name": "RHSA-2018:1637",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"name": "RHSA-2018:2948",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "VU#180049",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "RHSA-2018:1686",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"name": "RHSA-2018:2172",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"name": "RHSA-2018:1663",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"name": "USN-3652-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"name": "RHSA-2018:1629",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"name": "RHSA-2018:1655",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"name": "RHSA-2018:1640",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"name": "RHSA-2018:1669",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"name": "RHSA-2018:1676",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"name": "RHSA-2018:3425",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"name": "RHSA-2018:2363",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"name": "RHSA-2018:1632",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"name": "RHSA-2018:1650",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"name": "RHSA-2018:2396",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name": "RHSA-2018:2364",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"name": "USN-3653-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"name": "RHSA-2018:2216",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"name": "USN-3655-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"name": "RHSA-2018:1649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"name": "RHSA-2018:2309",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"name": "104232",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104232"
},
{
"name": "RHSA-2018:1653",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"name": "RHSA-2018:2171",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"name": "RHSA-2018:1635",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "RHSA-2018:2394",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name": "RHSA-2018:1710",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"name": "RHSA-2018:1659",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"name": "RHSA-2018:1711",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"name": "DSA-4273",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"name": "RHSA-2018:1738",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"name": "RHSA-2018:1674",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"name": "RHSA-2018:3396",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"name": "RHSA-2018:1667",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"name": "USN-3654-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"name": "RHSA-2018:1662",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"name": "RHSA-2018:1630",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"name": "RHSA-2018:1647",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"name": "RHSA-2018:1967",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"name": "USN-3655-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"name": "RHSA-2018:3399",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"name": "RHSA-2018:2060",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"name": "RHSA-2018:1690",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"name": "USN-3653-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"name": "RHSA-2018:2161",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"name": "RHSA-2018:2328",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"name": "RHSA-2018:1648",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"name": "RHSA-2018:2387",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name": "RHSA-2019:0148",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"name": "RHSA-2018:1654",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"name": "USN-3679-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"name": "USN-3777-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "RHSA-2018:1642",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"name": "RHSA-2018:3397",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "USN-3756-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name": "RHSA-2018:3398",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"name": "RHSA-2018:3400",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"name": "RHSA-2018:2228",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"name": "RHSA-2019:1046",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"name": "openSUSE-SU-2019:1439",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"name": "openSUSE-SU-2019:1438",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX235225"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"name": "openSUSE-SU-2020:1325",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-05-21T00:00:00",
"ID": "CVE-2018-3639",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Multiple",
"version": {
"version_data": [
{
"version_value": "Multiple"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:1689",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"name": "RHSA-2018:2162",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"name": "RHSA-2018:1641",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"name": "USN-3680-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"name": "RHSA-2018:1997",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"name": "RHSA-2018:1665",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"name": "RHSA-2018:3407",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "RHSA-2018:2001",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"name": "RHSA-2018:3423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"name": "RHSA-2018:2003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"name": "USN-3654-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"name": "RHSA-2018:1645",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"name": "RHSA-2018:1643",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"name": "RHSA-2018:1652",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"name": "RHSA-2018:3424",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"name": "RHSA-2018:3402",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"name": "TA18-141A",
"refsource": "CERT",
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"name": "RHSA-2018:1656",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"name": "RHSA-2018:1664",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"name": "RHSA-2018:2258",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"name": "RHSA-2018:1688",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"name": "RHSA-2018:1658",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"name": "RHSA-2018:1657",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"name": "RHSA-2018:2289",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"name": "RHSA-2018:1666",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:1675",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"name": "RHSA-2018:1660",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"name": "RHSA-2018:1965",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"name": "RHSA-2018:1661",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"name": "RHSA-2018:1633",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"name": "RHSA-2018:1636",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"name": "RHSA-2018:1854",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"name": "RHSA-2018:2006",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"name": "RHSA-2018:2250",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"name": "1040949",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040949"
},
{
"name": "RHSA-2018:3401",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"name": "RHSA-2018:1737",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"name": "RHSA-2018:1826",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"name": "USN-3651-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"name": "DSA-4210",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"name": "44695",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"name": "RHSA-2018:1651",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"name": "RHSA-2018:1638",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"name": "RHSA-2018:1696",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"name": "RHSA-2018:2246",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"name": "RHSA-2018:1644",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"name": "RHSA-2018:1646",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name": "RHSA-2018:1639",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"name": "RHSA-2018:1668",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"name": "RHSA-2018:1637",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "RHSA-2018:1686",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"name": "RHSA-2018:2172",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"name": "RHSA-2018:1663",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"name": "USN-3652-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"name": "RHSA-2018:1629",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"name": "RHSA-2018:1655",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"name": "RHSA-2018:1640",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"name": "RHSA-2018:1669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"name": "RHSA-2018:1676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"name": "RHSA-2018:3425",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"name": "RHSA-2018:2363",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"name": "RHSA-2018:1632",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"name": "RHSA-2018:1650",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"name": "RHSA-2018:2396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name": "RHSA-2018:2364",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"name": "USN-3653-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"name": "RHSA-2018:2216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"name": "USN-3655-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"name": "RHSA-2018:1649",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"name": "RHSA-2018:2309",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"name": "104232",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104232"
},
{
"name": "RHSA-2018:1653",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"name": "RHSA-2018:2171",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"name": "RHSA-2018:1635",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name": "RHSA-2018:1710",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"name": "RHSA-2018:1659",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"name": "RHSA-2018:1711",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"name": "DSA-4273",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"name": "RHSA-2018:1738",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"name": "RHSA-2018:1674",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"name": "RHSA-2018:3396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"name": "RHSA-2018:1667",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"name": "USN-3654-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"name": "RHSA-2018:1662",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"name": "RHSA-2018:1630",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"name": "RHSA-2018:1647",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"name": "RHSA-2018:1967",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"name": "USN-3655-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"name": "RHSA-2018:3399",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"name": "RHSA-2018:2060",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"name": "RHSA-2018:1690",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"name": "USN-3653-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"name": "RHSA-2018:2161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"name": "RHSA-2018:2328",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"name": "RHSA-2018:1648",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"name": "RHSA-2018:2387",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name": "RHSA-2019:0148",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"name": "RHSA-2018:1654",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"name": "USN-3679-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "RHSA-2018:1642",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"name": "RHSA-2018:3397",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "USN-3756-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name": "RHSA-2018:3398",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"name": "RHSA-2018:3400",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"name": "RHSA-2018:2228",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"name": "RHSA-2019:1046",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"name": "openSUSE-SU-2019:1439",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"name": "openSUSE-SU-2019:1438",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"name": "http://support.lenovo.com/us/en/solutions/LEN-22133",
"refsource": "CONFIRM",
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"name": "https://support.citrix.com/article/CTX235225",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235225"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_23",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-263.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180521-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html",
"refsource": "CONFIRM",
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"name": "openSUSE-SU-2020:1325",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-3639",
"datePublished": "2018-05-22T12:00:00Z",
"dateReserved": "2017-12-28T00:00:00",
"dateUpdated": "2024-09-16T22:55:27.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-3639\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-05-22T12:29:00.250\",\"lastModified\":\"2024-11-21T04:05:48.867\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.\"},{\"lang\":\"es\",\"value\":\"Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y que realizan la ejecuci\u00f3n especulativa de lecturas de memoria antes de que se conozcan las direcciones de todas las anteriores escrituras de memoria podr\u00edan permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n a un atacante con acceso de usuario local mediante un an\u00e1lisis de canal lateral. Esto tambi\u00e9n se conoce como Speculative Store Bypass (SSB), Variant 4.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD028C10-FD07-4206-A732-CCAC1B6D043D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93010C0-33B3-438F-94F6-8DA7A9D7B451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A988A78-6B3D-4599-A85C-42B4A294D86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246AA1B0-B6C8-406B-817D-26113DC63858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EE5B42-FF05-447C-BACC-0E650E773E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F0E3C4-7E9B-435F-907E-4BF4F12AF314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D616C72-0863-478C-9E87-3963C83B87E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC333B0D-3A0E-4629-8016-68C060343874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6655535C-FF64-4F9E-8168-253AABCC4F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD68F3F-7E38-40B9-A20B-B9BB45E8D042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EACEF19-83BC-4579-9274-BE367F914432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24128A7F-2B0B-4923-BA9E-9F5093D29423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0990DD71-9E83-499D-9DAF-A466CF896CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7FEDEF-9772-4FB1-9261-020487A795AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B0F72-DEDF-40C4-887C-83725C52C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9568C222-9816-4520-B01C-C1DC2A79002D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A1F23D-7226-4479-B51F-36376CC80B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454AC633-5F1C-47BB-8FA7-91A5C29A1DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2394E8C-58D9-480B-87A7-A41CD7697FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9AC02B-D3AE-4FAF-836E-55515186A462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AAC7A7-77CA-4C6C-BD96-92A253512F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD16C07-0050-495A-8722-7AC46F5920F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01423706-C82C-4457-9638-1A2380DE3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A881E2D3-A668-465F-862B-F8C145BD5E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6602DD69-E59A-417D-B19F-CA16B01E652C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED96AC16-12CC-43F6-ACC8-009A06CDD8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9DC29-C192-4553-AF29-D39290976F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F625E647-B47E-404C-9C5B-72F3EB1C46F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5878612-9825-4737-85A5-8227BA97CBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F453D348-28CE-402B-9D40-A29436A24ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36322F4B-83D7-468A-BB34-1C03729E9BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2A50E-94FA-44E9-A45D-3016750CFBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5625CAD8-4A62-4747-B6D9-90E56F09B731\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE1A01-3AEF-41E6-97EE-CB93429C4A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410184AF-B932-4AC9-984F-73FD58BB4CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B265F073-9E0A-4CA0-8296-AB52DEB1C323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F664223-1CBC-4D8A-921B-F03AACA6672B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"987A8470-08BA-45DE-8EC0-CD2B4451EECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBC9542-FB77-4769-BF67-D42829703920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FDC18B-4662-422E-A86A-48FE821C056F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723E7155-493D-4B5A-99E2-AB261838190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E37264-E4BA-4D9D-92E7-56DE6B5F918F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8704BE6D-2857-4328-9298-E0273376F2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1289B9E-5725-42EF-8848-F545421A29E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50287A9B-366F-41F2-BEBD-D4C64EF93035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCB79F2F-5522-45D3-A1D1-DC2F5A016D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9749C2B0-B919-4172-A2AD-04C99A479F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1F45A1-A17D-4895-8A71-00010C7E55D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D46BF41F-C44C-4D87-862E-0D156A2298DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5927D78A-EE05-4246-A141-4A8815AB228B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579FC479-DEA0-415D-8E8F-18A81A85A471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEECAA34-57F4-4B01-857C-C8454E1EDCAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967252A4-EC1F-4B31-97B8-8D25A3D82070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3205757B-07DB-4115-B3E0-4DF9D0EA2061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF8ABFA-BBFD-42F5-9769-00F8CD67F7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88AF1366-8A14-4741-8146-886C31D8D347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEAA43A-4D97-4E13-82E1-895F3B368B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6BAE0B-103D-430E-BAE9-429881620DE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2832E8BF-7AC7-444C-B297-66F770860571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D0A534-1749-4ED3-8F18-BF826D84EB56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B581515E-29CC-462F-BB10-4EA6DE2D6637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036D395E-AFE8-4D61-91CC-E9B3CD8B6380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44AA72FB-E78D-419E-AA82-B0538C6504D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687C3BF3-D71A-49AD-8A05-EAC07CBCD949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90AF90D9-16C4-4F8A-9868-3E2823E3445C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C063C53-8970-45B1-85F8-FB2080BF4695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64596ED7-794A-4D23-987B-D9AD59D48EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDA48F0-0F35-4A8F-8117-B0B28E00AB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A561A8E8-79E2-4071-B57D-590C22EF86A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E46658-60AB-4758-9236-3AC0E6464383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207B8FBA-E2FF-485A-9AD9-E604AE0FB903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F99640-C753-40BE-A0A1-4C2D92E7DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36609915-9E0D-4204-B544-4832E1195BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3612AC78-4904-4830-85DF-38A38F617379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B79CC0FA-3DA1-4812-8E73-B0FF0752E31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12F3759-48D2-4208-AD5B-3AC8B012D061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C61D9B-2733-4A67-9D6A-2290123C0405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C3C383-6927-44AD-9488-8B916D5959ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC1E41C-7A17-42B7-936D-09A236D9C4D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E814CB3E-4542-4E3E-91E8-D97EA17C0B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD43D7C-932B-463F-8EB2-3A115FBED4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CCD70F8-D81D-467B-8042-5D3B9AC513E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05C68D0-4771-4338-9761-6428195F0318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FC2878-389F-4687-8377-E192A1C519BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B24CEBE-51B1-4EC5-8770-BFDB0625193A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61BD85A8-39D9-4248-96FE-CAEF4BC7CD44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8320D28B-B10D-47AE-9B65-51304F93F9AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AD843A-EBB1-42BE-A305-595C23881404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D457B8B-50A6-411C-8528-96915B697C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3934C421-BD11-4174-83F4-3E20176F03F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45EE1BA7-5356-4421-9CF2-48DA09EBAE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92FE452A-EE8B-4ACE-96B1-B6BD81FAC9B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47195FE7-3692-42C4-B29E-679A6FE0E220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C033BBFA-67F4-4F24-A042-FF996B327976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF7A770-3E90-4466-8595-8E523D82BC62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7922C0-AB84-4331-BE8F-71A0D95D4F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648CB034-89BF-48FF-A3BF-C84C08FE09E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7DC164-65FF-483A-AD69-3E23E449E52C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3DCB95-5139-44C6-8151-8CEFD37F9DAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5FEA46-49A2-4082-98D2-56E698A56909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B85D7F3-1FA5-4FE1-AAFF-CEE8DF822CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80607FEB-8908-40F6-B702-FD56D849E2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F20575-82C0-466D-8FDD-AAC034247D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648E21A8-6B5F-4C97-A71A-44B97DBB4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172EA906-A08F-4D2A-9814-937C07F77C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA35BD-1048-4B6E-96B2-1CFF615EB49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979FEE9F-A957-43B6-BB6D-1A851D6FA11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7AF59D-D05E-47F9-B493-B5CD6781FDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF7EC93-0170-45A9-86C7-5460320B2AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A7B1C2-D2CE-485A-9376-27E14F3FA05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F803AC-DCC7-43FC-BEB3-AA7984E0506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560993AA-299D-42B7-B77F-1BD0D2114CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C582B1C-1DAC-48FD-82DD-7334C10A2175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7862B0C-2C44-4110-A62A-083116129612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048C5996-F719-4338-B148-0DD1C13E02FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9FF7FB-AB5A-4549-8C15-E69458C649E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CEF6608-B650-4C77-9823-0AD57B3484F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE6A2D7-901C-45F9-B487-D674047D522E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADCB509-5B0E-4592-8B23-EC25A3F79D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB51691F-089F-4016-B25E-238074B06C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBAAC728-6A0F-4675-9677-AAF7DD5D38ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA37503-FD3D-4220-933C-234631D6EDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72992831-2A76-456B-A80C-944BDD8591E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79C2131-5566-4CC2-B6ED-38E3F6964500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BFDAA6-3DFC-4908-BC33-B05BAB462F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6266056-770A-4E2D-A4FC-F1475257648E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929AA8F3-8BDF-4614-9806-6D4231735616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605D7552-8184-4B11-96FD-FE501A6C97DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3144BBDE-CC96-4408-AA02-ECC3BF902A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8BA77A-34E3-4B9E-822A-7B7A90D35790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7165B43-ED22-4714-8FA4-1E201D1BFA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CFB133-FAF0-431A-9765-8A9738D6D87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2975B0F2-DB7C-4257-985A-482ED2725883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70221E07-3C2E-4A82-8259-AD583EB5CDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427DFD78-56CD-43C4-948E-F53AF9D669F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AD7649-3FEA-4971-9886-6C9312B937A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4EE972C-6BAE-4342-BA01-1D685487F9C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDFE3B-C064-49A9-BD43-3F7612257A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD0EEC1-D695-41A5-8CD6-9E987A547CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBF25B8-D474-4C6B-8E45-F57DDC7074E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF18FD1-6670-4C3C-8000-A079C69D575E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921EB5A5-F911-4FCE-A6F1-C66818B34678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13878C13-1C7C-4B83-AF27-4998E8F659DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023063E1-2DD7-487C-A8A7-939FAEE666A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77255CE6-D7B7-4B48-993C-7100A1170BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40AC368-3A14-4EFF-A8D0-7EFB4C83045D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C07E80D5-70A5-49C9-9044-D683C7ECCFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63668AF4-F29C-4424-8EC5-2F0A5950DD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C1C7CD-538D-4D7A-A81C-10DF5376A479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5922F749-2B23-44B8-8A46-F31BCAEAD279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C48BBAF-6B27-43D6-B86B-40CD8E7BA056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75D0EEB-707C-4C86-A569-E91E9F00BA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0FB0E20-0243-40A1-8DEF-37150791222E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CFF26D-8AD3-4179-9E4C-F06D7C858C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7541572C-229F-4963-B7F0-06EB3323E53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479F7C77-D16F-4E40-9026-3EB8422E0401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04DB08C8-0018-4A8E-A206-097BDDF83B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7193E85-30BE-42D5-A26B-3F88817F3574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"446E8515-45FC-4B8B-8D12-60643D64C07F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDF6B2-D388-4639-87D8-064AA3F6B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AAB8B6-B614-4EAA-BA90-C5326CB5D07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A371DF9-E224-404F-99C2-C2A4607E62D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F40E356-365D-44B7-8C38-A0C89DDD6D3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3132029-89F8-4359-A0DC-A275785266A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02F5685-0636-48AB-B222-434CA1F3B336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED4693C-DECF-4434-90C0-56158F102E7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB408A6B-0842-43DA-9180-B0A299FCBCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6215EBAC-7C75-4647-9970-482120897F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1BD2B6-1AF6-4AD4-94FA-94B453A21908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1FD6E8-80EC-461F-9ED1-CE5912399E80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96F585E-BDEF-45EE-B0AB-94FE23753AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3279C067-3058-4D46-A739-05404FD0E9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0855225-F501-486A-BD03-2A86FD252B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214C7B0C-C438-4000-9F9B-6D83294243AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C91AA2E-4BB2-49C8-9364-4E363DF42CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA26781F-5A1C-4DA5-835E-D984D697F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEA4222-F25D-4457-80AA-6D05CA918D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6777AC35-9D1F-4153-94AC-B25627D730E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F063F4-8994-4E46-BA7B-A12A112009BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6F2DE5-AF11-439A-8D37-30CB882ECD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E213DD86-5419-42C8-BF38-7795DDB3C582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A972291E-5231-439D-873B-2F87BCAF800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C089CC54-3229-43D7-AA15-73CFA1A43EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF268D83-C15D-4559-A46F-844E1D9264F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE97C0D-3EA1-4314-A74A-7845C7778FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34293F29-F327-4ADD-BF62-78F63F79BB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528C0A46-1CC4-4882-985A-0BB41525BC6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643F3522-A452-4927-944D-532574EC4243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F40B78-4DBA-44EE-8420-086789EFF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"423BFD8F-4B50-43DA-9979-75FD18FBC953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BAD4A68-0481-476F-BBBD-3D515331368C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838CEB7C-7C4C-416C-86CE-6E8DD47EF25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7D021F-3C97-45B3-B1F7-0AC26959F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A31AEF3-448D-417B-9589-4BA0A06F2FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A1D96F-7FFD-413F-ABCE-4530C3D63040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B8343FE-1320-40AE-A37F-70EF1A4AC4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD42BA5A-7DA0-409D-8685-E43CF9B61D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FF80E9-CF28-4EF6-9CFE-4B500A434674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647B77A4-2F49-4989-AF43-961D69037370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B1E33-F279-4303-9DF3-C81039A40C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7E0AAE-6539-4024-9055-BE0BAD702143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1A8828-0765-4799-AD6C-143F45FAAD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D34618-1CCA-405B-A49C-EB384A09C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575D6061-66BC-4862-BC84-ECD82D436E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B6EE64-1AD4-46B2-BA65-BB6282E56EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11650B45-0BDA-42BF-AEF3-83B48DD6A71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3C92BA-827B-48AF-BBB3-FB60A9053C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB44CA7-DFE6-4B1A-9A63-97AE30017E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B305EFA-6226-412C-90EE-F0691F2DDDE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3874FA-63CB-4B5D-8B64-CE920320A4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0800ED17-50E4-43F3-B46C-591DFA818BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46B0405-F301-4209-8766-6E12EAFAD157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99F9F1F-A967-4884-96CF-4488102DC0A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9B37AD-4599-425B-B39F-E571F4975266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5A5F1CF-A1E6-45F1-8B09-36566778DB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698C8A49-888B-4675-B3B0-25EDE2FD515E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D98F97-8EF4-48B5-84BE-C3CC27031FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B473D1FA-909B-492E-9C5B-94B0E20E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD5EA7E-322E-4CE6-89D4-7DB1055C9034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67836379-4E1A-45CD-9506-7D3F612E47C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B1BBC61-8664-4452-93A7-DDB4D2E4C802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044F0375-DF2F-4D9B-AD7E-473D34165E8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0655CA-A88C-4632-9A18-560E3F63B2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6965851-3B29-4C21-9556-97FD731EAA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52984FD2-44E0-4E91-B290-0376737EEF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF933366-7503-4F8D-B7AA-F6A16210EC37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2DAF5D-5BB7-49C6-8426-8B547505B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EABB21D-D021-434B-B147-CAF687097A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7609424D-95F1-4493-A20C-B1BA4EC6439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966DC636-C802-4D9F-8162-652AFB931203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75794EB-A5AF-43F0-985F-D9E36F04C6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C2CFF0-98FD-4A0D-8949-D554B2FE53D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F9217F-5028-4659-AA8E-F60548DE4D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC769DC-CF2E-4A3C-A610-264F024E6279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2B1CBF-D155-49BC-81A4-4172F177A5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370B2B32-519E-4373-8A04-5C5025D688BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D9B562-C279-4A55-A347-F28FC4F9CD12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2BA0-48A8-4107-8681-A7C34C553D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B009DE-A82F-4569-9B42-EC1EC4DA8A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683B6E83-37FF-4F9B-915F-059EBB29DB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E218718F-4BE6-48B0-A204-9DD4A932A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0AB327-B60A-473C-9D36-97766EE62D7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA249EE-4786-4E27-8787-5E8B88C2AEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBD0529-1CF3-44E5-85B3-19A3323C9493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D664EE97-07EC-410F-94C3-AEAB2C6A627D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31DB981-03B1-4A84-8D87-CD407C3C149F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBD155D-89D9-4677-A621-4D7613BE65C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02BD0D4-FFFD-4355-97D8-170362F10B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6635781A-2651-4EF2-A5AC-AEEEE63FDE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE6930-760A-48C0-B964-1E3ED6A8517C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E52DE90-DF96-4CE7-B8D1-226BA50E4D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8EB40E7-9B91-4106-B303-2B70AF395BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB0D5CD-8AF3-409D-96A7-718641D4B90D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E420B0B-0CD5-41C7-B25A-3DB856055F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0C295B-0D63-4BE7-830D-D927E00C301C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605C340D-2220-4669-B827-9009CB099E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8791879D-2908-4F57-8DB3-6D24100A9108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E823DC5B-98BE-4656-BFBF-3A7018F8F213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E8D558-ADE0-4358-9C76-7BD77BF23AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7973B3D0-F244-4E26-88F5-A2D9BF2E4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5CB567-4F86-4466-BE4D-BFF557ACAE0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A52611B-6583-4660-90D7-C9472728072B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80C6E89-B57C-47BB-8B95-50C03DFB3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9AB685B-FEE1-41EF-A046-1B34619E12A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9F6724-967A-4AF0-9896-12BF6164B2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1116BF-12D7-47CC-98DB-18B200CF9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBB28DE-726B-4AF0-88A5-35987E1E648B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1880E2B8-5E0E-4603-8D17-3ABA43D28179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAFBB92-1917-4238-832B-195FBE418271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DFDF3F-9A3F-42B8-99A1-A3F76B198358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8778F972-BF34-482F-9FA7-71A77F6138E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F288BB0-FE7A-4900-B227-BE80E4F4AADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E16338-A094-4CA9-B77F-6FE42D3B422C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E07AB33-5351-487D-9602-495489C7C0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22115ED6-1707-4840-B0D1-AD36BC0C75A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C633BC-831F-4CB7-9D62-16693444B216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD501E1-E78F-44C6-8A13-C29337B07EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9085BA0B-B7E2-4908-90C0-B4183891C718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81971C2F-137A-4F11-8C93-3B99D4CD1B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E0BDAC-398E-406B-B2DB-AE049D6E98B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFDE6C-DE58-4C4D-882E-474EF6C3D934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950C6BF9-AA47-4287-AC01-D183237490FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2355181D-D8EE-4F80-8280-13D5CBCF4779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5209343F-66B0-4DC0-9111-E2E64CFF7409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"720109A6-B79E-48E1-9AE7-7708B154788E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82FF0DBD-AE13-4232-80F7-F4C2E2CC9721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E944ED-8C02-46B8-BF95-0CE4C352753B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77AEA3D1-4846-46E2-9B80-20B19F00DC11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576978F-E93D-4A47-90B6-6A4E3A7DE558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D339FE5-001F-4005-88A5-CFFE37F9B63E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDABA86-497E-497E-A5BA-46F913A4840A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD886F4C-DB6F-4DDD-9807-8BCBB625C226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4C454B7-E5F4-4AAE-B577-FD71FA002C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BE2781-3A06-4D62-AC8B-68B721DA526B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA23772-2EB8-4BEE-8703-26D967EC4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DC766A-B1F9-4B83-9F9B-CF603EE476BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA594740-43C5-4F42-BA5B-00CA8AE7BB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B16E2-8118-43A0-9A80-5D96831D55FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB5C551-BADC-4A3A-93E5-2EBCA0704C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5383B7A3-1569-4FEB-B299-B87CE8C8A87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05BBDE0-6C47-4489-9455-7DA7D230ECA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1789AA69-EA31-44D1-82E6-228E48E18586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A7D5FF-3B1F-4C64-BB81-7A349765520D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0498B3-393A-4C32-B338-E6014B956755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451F752-6869-4AFA-BAE5-5C9A54427BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83710FD1-099B-436D-9640-061D515E10BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"517B71CE-6156-40E1-B068-A2B733E205E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DEEEE5-5055-4CE1-962C-C5F075F4CC02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8718DDAB-3208-48CF-9BCE-54DA1257C16A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1AA901-E822-4240-9D82-C9311E4F87B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CDE3DF-8E79-4997-94EB-B517FFCAE55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A0DE13-EB0B-493B-BC84-3AEB3D454776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1727697B-1F59-4E29-B036-C32E9076C523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69E827C-C0D0-46C7-913A-1C1E02CEAACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528F3F9-34DC-41DA-8926-382CB3EF5560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E452C262-5A8D-4D97-BC7F-A4F5FF53A659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D57BF69-D750-4278-98AA-976B0D28E347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76ADAE30-6CAD-4F5B-B6F7-C18953144C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A25D792-E21D-43EE-8B9D-67DE066DE5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C669783-C058-4B4F-BB9A-84B2C4682247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"159B088B-9A85-4CAA-854A-AA080E528F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE74A94-FE8F-4749-A35A-AB7D57E24913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"990AC341-0E67-4A81-87E9-EE3EFD9E847E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BC18B0-58F1-4477-9978-CA7383C197FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474992FB-842D-4661-A565-44AF2CD78693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476E1B79-5342-4895-96D7-E97DFC1F5334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD318D5-89A6-4E28-939C-C5B61396806B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32C7E89-32ED-4328-9313-FA7D3DDBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2792EED8-2CBD-478E-BC09-05FE830B3147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B1AF2F-6E48-4DBD-A60E-3088CA4C3771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E1691D-65B3-45E4-A544-8B29E38D569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42F2703-B8AB-410E-AF7B-CD0BE777F061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31244C94-00A3-499C-A91A-1BEF2FB0E6B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878FF6E8-8A6D-44CE-9DD1-2C912AB8A193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5078A95B-2BD8-4A37-A356-F53D1A53CB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFE67CD-DE53-4C4E-8245-35902AEFA6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F231D31-3AAD-4C5D-A225-D2DF94486718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5998DF5D-E785-45EC-B8D0-1F4EC4F96D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADFD013-0BFB-427C-98E6-F9E4774DCBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58620B10-FEA6-456D-B6B5-2745F5DBE82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4858A1F0-97F2-4258-AB98-027BF1EC5117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C961A8B-EAFD-4F66-9432-BCC0D154ECCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052DE6CD-A1E7-4E81-B476-66EF451061C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751B3AC8-D45E-46B6-83D5-311B693F3C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9588277A-0B97-4408-9CF7-11271CDAADD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FE854-85E5-4ED0-BFAF-2618C9053082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E048B9BF-77C8-49F7-9F2D-9999F79BA264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD16D4D-E816-486D-96F4-5A2BF75B959F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"169C558E-1A83-47D5-A66B-035BD1DD56FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D683E509-3FB2-4175-BCAB-4EB1B5C04958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCFA915-5445-4732-9F8F-D7561BA4177F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63A9FD98-C22D-48F6-87A1-60791C818A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F99F24-1783-4E6E-BE61-04C2E80356ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85289E4C-C813-4677-867D-EE8E98F4A1A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27C8150F-BEFA-406D-9F0D-E7CB187E26AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E807F90-819F-4103-B1F7-4CE46971BD63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD93203F-71B9-4F87-B5D8-FD273451C8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E652C74-C48D-4F29-9E85-09325632443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99158191-3013-4182-8A53-5DFCA1E2C60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E39A3E-7EAE-47C9-930B-58A980B73FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFDA54BA-C00D-4890-9B7F-328257607B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5EFB1E-334C-4B55-8E2E-6AE19B34774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8260DCA-2F0C-45F7-B35F-D489AF5639F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7778F81B-6D05-4666-B1D4-53DB0EC16858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC6706A-61F7-4AA0-B2FF-0FFDF739A644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF1B16B-02F2-4ECA-938E-B5CDCFC67816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5501D8-1B0D-4F5A-AFD7-C63181D3281F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1751F0CE-A0D3-40E2-8EEC-D31141FE33A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF9AFA7-BBE8-4229-94CB-5A9596728BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23A777F-68A4-4217-A75A-4D8A27E6451A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392A4337-11F6-4980-A138-4FDBCAD0EBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E9BB67-F1FF-4190-889F-78B965CCE934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35607317-0928-4297-A33E-D44BEE1BBEC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48323B1-7FEB-451F-A064-23E7CE7F6403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5763189-7980-4A72-92C9-1908FE9E15EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53ACD49-DA21-4DDE-A0AA-FCCD59D29886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4326D350-EBC2-48E6-A2C6-0499F6826CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8594E6FE-B6DB-4343-B3DD-AEC19923DAF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCADA00-E453-414D-9933-FCB43D21BBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E62212D9-F707-4A8E-AB2A-A3985E7A4049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"561755A8-8AAD-4F41-8266-747EFDAF2D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F4BB0F-DAF4-479B-B78A-7929C151AA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A207312E-1D35-4464-A111-22C4C793E146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B16E32-07D5-445B-BAA5-4E4A0881BFC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF08F6B-2ECB-414C-82D7-C06085BF8B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21032BE3-74D8-4C3F-B461-158F475B6853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9AC992-59B7-44EE-9FF3-567AC48938AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB6A2ED-D433-4A8E-8044-02571D0BBD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F819519-61B6-4ED0-8A23-509D6B26ACE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2D81C40-4BD0-4D25-95B4-44BE2011F117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85C3A39E-29D3-4C02-89A6-D5B3475EF592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70340A2-71DC-4D4D-BA2E-2B2E9ACDBE5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"586DB792-9FF6-4253-9DAE-F3ACA3F1C489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330576E9-3A92-4E22-BBC0-94A12ACE1032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C644430-A075-40E1-8E35-15B97D8E9078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC094AC-0A3A-43F3-823A-089235D04A7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5835FB20-922D-4478-8E4B-A53CCEE46198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"667A34BF-8699-477D-B30A-CEF0A36FC81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE586938-ED60-40EA-8177-30267C7A3E58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF902C36-0708-4B93-9504-5EA7EEDD628F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BC5EBB-2F1A-45C4-A8A7-122FBE4CBC93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795F5800-8C06-426B-80AA-20F8E402ACAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173E49AF-95A9-4DAE-8C74-13CFCA8F0726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE96391-4F25-4505-B757-D1F15ABD9FAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D037E4BA-35B9-42CB-9DDE-BED3DF49B958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43288516-FA4D-4D8F-9E69-EA27115EB43B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13EF19E9-FE9A-4ED7-8D9E-848F10C088B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB72D0E-0E34-4EF3-98FB-52BE4A135D2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDE7F94-D938-40BA-A1F6-CE52D0B74ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E39247-337C-49D1-BF1B-504F2DA4EBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A45FA7CB-6523-4042-8832-193D87102F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E350A6-9EC7-4E14-9790-040F154CE15D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8D70B4E-6B85-459C-AACA-59AB5CCC0B38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565EB5E9-3B86-4353-BFF6-3F5D27140B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32CBB5D-392A-4CD1-82D3-A97D822FADFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"383E08FE-EE7A-4E41-9AAD-786779D4B5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D50C6D5-3452-4214-B3FF-9F8009D75C3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93954C6-9B01-4CEB-8925-5D3F415AFC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7D54E5-6EDE-44DE-AEA6-F7F76E3EC36F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB2949C-4699-49EF-83EB-31199E0CE2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C169DC-EEFE-4DE6-A3D0-65B606527240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD28227A-8888-43B2-BC41-8D54B49DA58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7984BAEA-4518-4E17-830E-B34D09648BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2214E5-491E-448F-A4B6-A497FB44D722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE93013-C262-46A5-8E77-D647881EE632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B53CEC-943F-4966-8EC1-CB2C6AD6A15B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEAC04A3-EBE3-406B-B784-A3547162ECE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15720FFE-B2A4-4347-BCD7-DFA6774C0B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F46B0E-C746-44B4-B343-E3DCAB4B98DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE30903-4F75-4D71-A8BB-44D1099E9837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98311EAA-26C8-4092-8BE5-4E7BEAA68DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8CF348-811C-4342-ACB9-AFCABCC34331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71998EC5-EC0F-496C-B658-3CD91D824944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F19B2A-E7A1-4B97-AC40-02B0D3673555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6387C9-C0A8-4B26-BC62-802775CD0AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFEB0164-77C2-4EC2-92FD-5FCE246119CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB20210-337C-4220-8CA1-F4B2BC54EBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F699569F-4F52-4CC0-90D9-CC4CBC32428A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBAED22B-D097-49C4-ADDF-4B3F3E1262D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7756B588-5A63-4508-8BDD-92DB8CB0F4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316E26AE-67A5-4E75-8F9B-ECF4A03AED51\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"001AB619-157E-40B4-B86C-5DB18245D62F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38D51E27-28A3-47A1-9C36-1A223858E352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"365DF3EF-E7D1-41FC-8382-D3B095542D59\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DAA72A4-AC7D-4544-89D4-5B07961D5A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B8C725-34CF-4340-BE7B-37E58CF706D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40C26BE-56CB-4022-A1D8-3CA0A8F87F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4AC996-B340-4A14-86F7-FF83B4D5EC8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E938A8EB-68FE-427B-B67E-C880FBF54BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA1A18F-D997-4121-A01B-FD9B3BF266CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967EC28A-607F-48F4-AD64-5E3041C768F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C9F1C4-55B0-426D-BB5E-01372C23AF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF83BB87-B203-48F9-9D06-48A5FE399050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3EFED2-F6BC-46D9-AB22-D5ED87EF4549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"3BC8E8CF-2507-49DE-BF54-CCF16A2861F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"742BCB01-8856-4F6F-86B6-A1DB878C3062\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"5178C320-CDB7-4180-951B-BFBCFAFB7FAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE4079D-C47A-4D57-9B37-947DE42F8A60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"4E1F645D-141D-4BCB-8F90-4A7BCC08988B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B203F60B-0694-4B46-96CB-E8C5E4375E85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"F702CAFB-3ED9-4185-9781-1DAA8A0B01DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C231846-D2BC-428F-AADE-A7E09DB3A547\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"CBA817DF-52C1-4FCC-A661-F81D923A18EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D00016F2-3E88-4F57-AD2B-378153E73956\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"B30A4009-B0DD-492E-AEC1-985261707AC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4ED0315-9898-4110-96AB-5C198357ED83\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndIncluding\":\"13.3\",\"matchCriteriaId\":\"7E49B728-E8DE-4B23-9564-7BFDED6F299E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8C192B-8044-4BF9-9F1F-57371FC0E8FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B6FA71-3077-4202-A9A1-CBDF9AE2521E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4F2A68-3715-4F86-BEEC-8C4D4341B100\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6\",\"matchCriteriaId\":\"B42251AC-8FED-4BDE-93B3-5203F32D6313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A661231-49DF-477F-954A-702839A9266B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.01.09\",\"matchCriteriaId\":\"8CAD5D20-80DB-4A09-AFBA-BCA594DE3B93\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADAD919-32C1-49D2-A419-C9A803DB6250\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"22.01.06\",\"matchCriteriaId\":\"503E551C-FC5F-4ABC-8DEA-E360701F0B33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"506DEE00-30D2-4E29-9645-757EB8778C0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"664FC58B-33E9-43E4-A87E-5C78F935C332\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4809A582-BC22-41A0-815A-32CF2BA197F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.5\",\"matchCriteriaId\":\"45509778-898E-45DF-B14E-68B6C456B9B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D276DE-950F-4A61-BA13-DD5D07A17571\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AB7B8D-D6FB-43A0-865D-58D4CDF96C06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA7336B-85CA-4A15-B7A6-D20B67041CCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.0x.14\",\"matchCriteriaId\":\"FBA3B550-EB8B-4EBB-A1F0-14152A6791DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.09\",\"matchCriteriaId\":\"33F546AF-8F80-4E0A-9B92-86E3A1F931C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40D0CDB-7BE6-491F-B730-3B4E10CA159A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55FC2D5-DCF6-4A24-873F-D0CF80DB3921\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E4335E3-D2BB-4465-BBC8-611C7F85BEF8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.0x.14\",\"matchCriteriaId\":\"435F7F3C-7483-4101-BC0A-E1E2BB66D6C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A6744-5194-4A99-BD3B-944A8707C80F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.09\",\"matchCriteriaId\":\"6B5B6E6B-16A0-4236-AABE-82385B53EC78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF9D4C3-1892-48FA-95B4-835B636A4005\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.01.09\",\"matchCriteriaId\":\"224D0968-6414-41F7-8929-C69D524A416F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r1.30.0\",\"matchCriteriaId\":\"D476D093-4A97-499C-B40D-7A301BC9AA2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DD4A97-1648-4C7F-A5A0-6899BD13A617\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r1.23.0\",\"matchCriteriaId\":\"940CCA5A-EC4A-4D46-B56C-4FC3698707E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB339B5-602F-4AB5-9998-465FDC6ABD6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.02.15\",\"matchCriteriaId\":\"203B30DB-52C6-48ED-8A94-76F775DA1198\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1A57A9-F6E5-4672-BD22-09EF5522CA10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"790D244A-AC3D-4BBC-9139-A90048FD375A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509AD120-3465-4C00-AAB3-B6F6ED708B51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.01.14\",\"matchCriteriaId\":\"05466B50-76ED-41E7-87DC-96CA95AAC6A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E752006C-6D94-4B14-B3A5-C9BB94141BDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.01.14\",\"matchCriteriaId\":\"0C046182-BB33-41D0-B041-1566B8041917\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EF28FB-BAB3-4710-9D25-25F67ACADC60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"8DE74300-E061-452E-AD1D-6DD7C2C62729\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057D9947-CE4A-4B4C-B721-4B29FB71350C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.02.15\",\"matchCriteriaId\":\"F232B7B4-D633-47ED-B435-6EB6530019F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.02.15\",\"matchCriteriaId\":\"9C0D4DB3-FBA2-4868-8A38-5D81E622C709\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FFD2D72-5464-4B86-BACB-61F55A081C3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.02.11\",\"matchCriteriaId\":\"BE4A7C13-6F81-4629-9C28-9202028634AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D87239-40C1-4038-B734-D77AC4DDD571\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.01.14\",\"matchCriteriaId\":\"8014E0E5-F880-4886-8294-7EC971D5BBF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687E1212-EC5A-47BA-ACAB-74F6C98B7C34\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"19.01.14\",\"matchCriteriaId\":\"93485235-481B-4BAF-BB7A-81BB5AA1BC53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F37D88-E086-4060-8420-BD0F8D8FF580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.01.04\",\"matchCriteriaId\":\"AD949046-46E5-48C9-883B-92F04926E8BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"187C6D51-5B86-484D-AE0F-26D1C9465580\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6\",\"matchCriteriaId\":\"8F81F41D-480F-4443-927E-00607DD40BF5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DDEA9B-E1BF-4572-8E12-D13C54603E77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.0x.14\",\"matchCriteriaId\":\"B8102F17-F6DA-4EE9-B533-EA806D9E7F7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE09494-625A-4FF7-8B3E-6510FF9AFC9C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8095A5-3677-4024-9437-C46DA382C280\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9565FE15-A705-4D0A-BFA3-30871FDCF9DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.02.15\",\"matchCriteriaId\":\"8E16526D-CCA8-45B2-829E-4562A7440356\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9220E9B5-5A0E-4F90-9A2C-B4692E937DBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE42ABA9-E5D8-4589-B111-AE191747E03D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E53E94C-0F57-4A71-B919-C34984A5ADB6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2051E518-7CCD-4B49-9705-BDDC37177BE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF739F2D-744A-44CE-8DA7-F89A14239943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"417953F8-F722-4CD0-BC59-1192A4533505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61E87F32-4157-42A3-A758-36AA2A4D7AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEABF0C-99D9-415D-B8CB-B632C644664E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150C225A-C4A0-4CC7-91AA-8F341D8152F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"762B1578-25AD-4ACC-A1AE-C325155F49F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E561C59C-9E46-4FE1-8DA7-5E524FB9D87E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1077221-796B-44E7-A278-579F41BA5DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6F3481-E5DF-452A-AE3C-1ED648B54234\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BD39AA6-8D0B-405C-8A69-9264C82BCDAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD00A81-9A08-4C24-B720-BC7C99DCF19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2008DF4A-1AC8-4CC0-8649-823B3B6BD329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD3D92A-D07F-4087-81AF-0FA78E290DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0220EB54-D74B-451C-8FA6-D71BF39B578F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED1C215-1656-4113-B571-9479FDEB9ACF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.6.0\",\"matchCriteriaId\":\"6CB56955-1A47-4F6C-A354-8BBAE7534504\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBD7A51-0590-4DDF-8249-5AFA8D645CB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r28.3\",\"matchCriteriaId\":\"D05993AD-FABF-49A6-B3F5-6DF1B0835321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r28.3\",\"matchCriteriaId\":\"1455BBEB-871A-41FE-A4BD-6DC583777252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC248D3F-1D6D-48FC-94BA-3C24A182D172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"987ECFC7-D504-488D-B977-FEC182819567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75F0910-3EED-4365-B03E-B3295A762656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12C0B9FE-09FD-4991-BE14-499FFC728EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7585B88F-58FA-4DF2-AA99-185731253A05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD7F77C-F02B-4EAF-8836-C97ACB5AFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A98AB09C-24D8-4B58-9F4A-EF6B42EB27C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FF4194A-8194-4727-8C10-4F44D5041011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE2E768-0F45-46E1-B6D7-087917109D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B14968-3985-43C3-ACE5-8307196EFAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB85C75-4D35-480E-843D-60579EC75FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8F3DD2-A145-4AF1-8545-CC42892DA3D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B1C231-DE19-4B8F-A4AA-5B3A65276E46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"matchCriteriaId\":\"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66CAFDB7-9D41-4E67-AB83-5EB104551FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAACE735-003E-4ACB-A82E-C0CF97D7F013\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.lenovo.com/us/en/solutions/LEN-22133\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/1\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/2\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/5\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104232\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040949\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-263.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1629\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1630\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1632\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1633\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1635\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1636\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1637\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1638\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1639\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1640\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1641\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1642\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1643\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1644\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1645\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1646\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1647\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1648\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1649\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1650\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1651\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1652\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1653\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1654\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1655\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1656\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1657\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1658\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1659\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1660\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1661\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1662\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1663\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1664\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1665\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1666\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1667\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1668\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1669\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1674\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1675\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1676\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1686\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1688\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1689\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1690\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1696\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1710\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1711\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1737\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1738\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1826\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1854\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1965\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1967\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1997\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2001\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2003\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2006\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2060\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2161\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2162\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2164\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2171\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2172\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2216\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2228\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2246\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2250\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2258\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2289\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2309\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2328\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2363\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2364\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2387\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2394\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2396\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3396\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3397\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3398\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3399\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3400\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3401\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3402\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3407\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3423\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3424\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3425\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0148\",\"source\":\"secure@intel.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1046\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/4787\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"secure@intel.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180521-0001/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX235225\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3651-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3652-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3679-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3680-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3756-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3777-3/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4210\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4273\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44695/\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_23\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.us-cert.gov/ncas/alerts/TA18-141A\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.lenovo.com/us/en/solutions/LEN-22133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/06/10/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/104232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040949\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1042004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-263.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1630\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1637\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1638\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1642\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1645\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1649\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1650\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1651\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1657\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1660\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1666\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1668\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1669\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1674\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1686\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1689\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1737\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1965\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2172\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2250\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2363\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2364\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2387\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2948\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3397\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3398\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3407\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3424\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0148\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://nvidia.custhelp.com/app/answers/detail/a_id/4787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180521-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX235225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3651-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3652-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3653-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3655-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3679-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3680-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3756-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3777-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4210\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4273\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44695/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.us-cert.gov/ncas/alerts/TA18-141A\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
CERTFR-2018-AVI-259
Vulnerability from certfr_avis - Published: 2018-05-30 - Updated: 2018-05-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat . Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
}
],
"initial_release_date": "2018-05-30T00:00:00",
"last_revision_date": "2018-05-30T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-259",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat . Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1738 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1638 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1641 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1639 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1737 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1640 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:1637 du 29 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
}
]
}
CERTFR-2018-AVI-357
Vulnerability from certfr_avis - Published: 2018-07-25 - Updated: 2018-07-25
Une vulnérabilité a été découverte dans le noyau Linux de Red Hat . Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-07-25T00:00:00",
"last_revision_date": "2018-07-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 RedHat\u00a0RHSA-2018:2250 du 24 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
}
],
"reference": "CERTFR-2018-AVI-357",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de Red Hat . Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2250 du 24 juillet 2018",
"url": null
}
]
}
CERTFR-2021-AVI-923
Vulnerability from certfr_avis - Published: 2021-12-08 - Updated: 2021-12-08
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3896"
},
{
"name": "CVE-2018-16882",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16882"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2020-12655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-08T00:00:00",
"last_revision_date": "2021-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-923",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213933-1 du 06 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213933-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213929-1 du 06 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213929-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213941-1 du 07 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213941-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213969-1 du 08 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213969-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213935-1 du 07 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213935-1/"
}
]
}
CERTFR-2018-AVI-308
Vulnerability from certfr_avis - Published: 2018-06-27 - Updated: 2018-06-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2017-17741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17741"
}
],
"initial_release_date": "2018-06-27T00:00:00",
"last_revision_date": "2018-06-27T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-308",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1816-1 du 26 juin 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1/"
}
]
}
CERTFR-2018-AVI-368
Vulnerability from certfr_avis - Published: 2018-08-01 - Updated: 2018-08-01
Une vulnérabilité a été découverte dans le noyau Linux de RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-08-01T00:00:00",
"last_revision_date": "2018-08-01T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-368",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de RedHat. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2309 du 31 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
}
]
}
CERTFR-2018-AVI-524
Vulnerability from certfr_avis - Published: 2018-10-31 - Updated: 2018-10-31
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | Safari | Safari versions antérieures à 12.0.1 | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.6 | ||
| Apple | N/A | iOS versions antérieures à 12.1 | ||
| Apple | N/A | watchOS versions antérieures à 5.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.6 | ||
| Apple | N/A | tvOS versions antérieures à 12.1 | ||
| Apple | N/A | iCloud for Windows versions antérieures à 7.8 | ||
| Apple | macOS | macOS Mojave versions antérieures à 10.14 | ||
| Apple | N/A | iTunes versions antérieures à 12.9.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Safari versions ant\u00e9rieures \u00e0 12.0.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud for Windows versions ant\u00e9rieures \u00e0 7.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Mojave versions ant\u00e9rieures \u00e0 10.14",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4310"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4391"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-4368",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4368"
},
{
"name": "CVE-2018-4395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4395"
},
{
"name": "CVE-2018-4425",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4425"
},
{
"name": "CVE-2018-4259",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4259"
},
{
"name": "CVE-2018-4400",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4400"
},
{
"name": "CVE-2018-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4415"
},
{
"name": "CVE-2018-4427",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4427"
},
{
"name": "CVE-2018-4369",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4369"
},
{
"name": "CVE-2018-4396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4396"
},
{
"name": "CVE-2018-4291",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4291"
},
{
"name": "CVE-2017-12618",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12618"
},
{
"name": "CVE-2018-4374",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4374"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2018-4350",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4350"
},
{
"name": "CVE-2018-4386",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4386"
},
{
"name": "CVE-2018-4417",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4417"
},
{
"name": "CVE-2018-4331",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4331"
},
{
"name": "CVE-2018-4398",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4398"
},
{
"name": "CVE-2018-4412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4412"
},
{
"name": "CVE-2018-4420",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4420"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4392"
},
{
"name": "CVE-2018-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4409"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2018-4419",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4419"
},
{
"name": "CVE-2018-4371",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4371"
},
{
"name": "CVE-2018-4348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4348"
},
{
"name": "CVE-2018-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4382"
},
{
"name": "CVE-2018-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4424"
},
{
"name": "CVE-2017-12613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12613"
},
{
"name": "CVE-2018-4288",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4288"
},
{
"name": "CVE-2018-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4203"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2018-4402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4402"
},
{
"name": "CVE-2018-4377",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4377"
},
{
"name": "CVE-2018-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4378"
},
{
"name": "CVE-2018-4341",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4341"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-4426",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4426"
},
{
"name": "CVE-2018-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4367"
},
{
"name": "CVE-2018-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4399"
},
{
"name": "CVE-2018-4342",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4342"
},
{
"name": "CVE-2018-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4389"
},
{
"name": "CVE-2018-4403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4403"
},
{
"name": "CVE-2018-4411",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4411"
},
{
"name": "CVE-2018-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4408"
},
{
"name": "CVE-2018-4375",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4375"
},
{
"name": "CVE-2018-4418",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4418"
},
{
"name": "CVE-2018-4340",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4340"
},
{
"name": "CVE-2018-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4394"
},
{
"name": "CVE-2018-4365",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4365"
},
{
"name": "CVE-2018-6797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6797"
},
{
"name": "CVE-2018-4308",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4308"
},
{
"name": "CVE-2018-4126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4126"
},
{
"name": "CVE-2018-4376",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4376"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2018-4286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4286"
},
{
"name": "CVE-2018-4334",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4334"
},
{
"name": "CVE-2018-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4304"
},
{
"name": "CVE-2018-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4393"
},
{
"name": "CVE-2018-4354",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4354"
},
{
"name": "CVE-2018-4406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4406"
},
{
"name": "CVE-2018-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4372"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4287"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2018-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4423"
},
{
"name": "CVE-2018-4385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4385"
},
{
"name": "CVE-2018-4153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4153"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-4388",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4388"
},
{
"name": "CVE-2018-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4373"
},
{
"name": "CVE-2018-4295",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4295"
},
{
"name": "CVE-2018-4416",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4416"
},
{
"name": "CVE-2018-4366",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4366"
},
{
"name": "CVE-2018-4401",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4401"
},
{
"name": "CVE-2018-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4410"
},
{
"name": "CVE-2018-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4242"
},
{
"name": "CVE-2018-4384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4384"
},
{
"name": "CVE-2018-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4422"
},
{
"name": "CVE-2018-4413",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4413"
},
{
"name": "CVE-2018-4407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4407"
},
{
"name": "CVE-2018-4346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4346"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4387"
},
{
"name": "CVE-2018-4326",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4326"
},
{
"name": "CVE-2018-4390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4390"
}
],
"initial_release_date": "2018-10-31T00:00:00",
"last_revision_date": "2018-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209192 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209192"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209193 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209193"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209195 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209195"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209196 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209197 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209197"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209194 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209194"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT209198 du 30 octobre 2018",
"url": "https://support.apple.com/en-us/HT209198"
}
]
}
CERTFR-2018-AVI-429
Vulnerability from certfr_avis - Published: 2018-09-11 - Updated: 2018-09-11
De multiples vulnérabilités ont été découvertes dans SCADA les produits Siemens. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | RUDGECOM, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
| Siemens | N/A | SIMATIC WinCC OA versions 3.14 et antérieures | ||
| Siemens | N/A | SCALANCE X408 toutes versions antérieures à 4.0.0 | ||
| Siemens | N/A | SINUMERIK, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
| Siemens | N/A | SCALANCE X300 toutes versions antérieures à 4.0.0 | ||
| Siemens | N/A | SIMATIC, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
| Siemens | N/A | SINEMA, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) | ||
| Siemens | N/A | SCALANCE X414 toutes versions | ||
| Siemens | N/A | SIEMENS TD Keypad Designer toutes versions | ||
| Siemens | N/A | SIMOTION, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "RUDGECOM, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC OA versions 3.14 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X408 toutes versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X300 toutes versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINEMA, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X414 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIEMENS TD Keypad Designer toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-13806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13806"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13807"
},
{
"name": "CVE-2018-13799",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13799"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
}
],
"initial_release_date": "2018-09-11T00:00:00",
"last_revision_date": "2018-09-11T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-429",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-09-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SCADA les produits\nSiemens. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-268644 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-447396 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-447396.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-346256 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-346256.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-198330 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-198330.pdf"
}
]
}
CERTFR-2018-AVI-362
Vulnerability from certfr_avis - Published: 2018-07-30 - Updated: 2018-07-30
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Legacy Software 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1118"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-12233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12233"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1000200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
}
],
"initial_release_date": "2018-07-30T00:00:00",
"last_revision_date": "2018-07-30T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-362",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182091-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182099-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182112-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182094-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182094-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182088-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182090-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182090-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182103-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182096-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182096-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182093-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182109-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182098-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182098-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182104-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182095-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182095-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182105-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182105-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182107-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182107-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182108-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182108-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182106-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182092-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182086-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182087-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182087-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182115-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182115-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182114-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182114-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182101-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182101-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182111-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182111-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182102-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182102-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182113-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182097-1 du 27 juillet 2018",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182110-1 du 27 juillet 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182110-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-20182100-1 du 27 juillet 2018",
"url": null
}
]
}
CERTFR-2019-AVI-036
Vulnerability from certfr_avis - Published: 2019-01-30 - Updated: 2019-01-30
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | IBM QRadar SIEM versions 7.3.x antérieures à 7.3.1 Patch 6 | ||
| IBM | QRadar | IBM Security QRadar Packet Capture versions 7.2.x antérieures à 7.2.8 Patch 4 | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.3.x antérieures à 7.3.1 Patch 1 | ||
| IBM | QRadar | IBM QRadar Network Packet Capture versions 7.2.x antérieures à 7.2.8 Patch 1 | ||
| IBM | QRadar | IBM Security QRadar Packet Capture versions 7.3.x antérieures à 7.3.1 Patch 1 | ||
| IBM | QRadar | IBM QRadar SIEM versions 7.2.x antérieures à 7.2.8 Patch 14 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM QRadar SIEM versions 7.3.x ant\u00e9rieures \u00e0 7.3.1 Patch 6",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security QRadar Packet Capture versions 7.2.x ant\u00e9rieures \u00e0 7.2.8 Patch 4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.3.x ant\u00e9rieures \u00e0 7.3.1 Patch 1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Network Packet Capture versions 7.2.x ant\u00e9rieures \u00e0 7.2.8 Patch 1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Security QRadar Packet Capture versions 7.3.x ant\u00e9rieures \u00e0 7.3.1 Patch 1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.2.x ant\u00e9rieures \u00e0 7.2.8 Patch 14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
}
],
"initial_release_date": "2019-01-30T00:00:00",
"last_revision_date": "2019-01-30T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-036",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar. Elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 0796076 du 23 janvier 2019",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10796076\u0026myns=swgother\u0026mynp=OCSSBQAC\u0026mync=E\u0026cm_sp=swgother-_-OCSSBQAC-_-E"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 0796130 du 23 janvier 2019",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10796130\u0026myns=swgother\u0026mynp=OCSSBQAC\u0026mync=E\u0026cm_sp=swgother-_-OCSSBQAC-_-E"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 0796134 du 23 janvier 2019",
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10796134\u0026myns=swgother\u0026mynp=OCSSBQAC\u0026mync=E\u0026cm_sp=swgother-_-OCSSBQAC-_-E"
}
]
}
CERTFR-2018-AVI-280
Vulnerability from certfr_avis - Published: 2018-06-13 - Updated: 2018-06-13
Une vulnérabilité a été découverte dans le noyau Linux de Red Hat . Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-06-13T00:00:00",
"last_revision_date": "2018-06-13T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-280",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de Red Hat . Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat du 12 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
}
]
}
CERTFR-2019-AVI-489
Vulnerability from certfr_avis - Published: 2019-10-08 - Updated: 2019-10-08
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC PROFINET Driver versions antérieures à V2.1 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC CFU PA versions antérieures à V1.2.0 | ||
| Siemens | N/A | SINAMICS S120 V4.7 (Control Unit et CBE20) versions antérieures à V4.7 HF34 ou V5.2 HF2 | ||
| Siemens | N/A | SINAMICS GH150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/2 HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | SINAMICS G120 V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN/3 HF versions antérieures à V4.2.1 | ||
| Siemens | N/A | SCALANCE X-200IRT versions antérieures à V5.4.2 | ||
| Siemens | N/A | SINAMICS G130 V4.7 (Control Unit) versions antérieures à V4.7 HF29 ou V5.2 HF2 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions antérieures à V4.1.1 Patch 05 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions antérieures à V4.5.0 | ||
| Siemens | N/A | SINAMICS GL150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | CP1616 versions antérieures à V2.8 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SIMATIC ET 200MP IM 155-5 PN BA versions antérieures à V4.2.3 | ||
| Siemens | N/A | SINAMICS G110M V4.7 (PN Control Unit) versions antérieures à V4.7 SP10 HF5 | ||
| Siemens | N/A | SINAMICS DCM versions antérieures à V1.5 HF1 | ||
| Siemens | N/A | SINAMICS GM150 V4.7 (Control Unit) versions antérieures à V4.8 SP2 HF9 | ||
| Siemens | N/A | SIMATIC IT UADM versions antérieures à V1.3 | ||
| Siemens | N/A | Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions antérieures à V4.5.0 Patch 01 | ||
| Siemens | N/A | SIMATIC S7-400H V6 versions antérieures à V6.0.9 | ||
| Siemens | N/A | SIMATIC WinAC RTX (F) 2010 versions antérieures à SIMATIC WinAC RTX 2010 SP3 avec les mises à jour BIOS et Windows | ||
| Siemens | N/A | SIMATIC ET 200SP IM 155-6 PN HF versions antérieures à V4.2.2 | ||
| Siemens | N/A | CP1604 versions antérieures à V2.8 | ||
| Siemens | N/A | SINUMERIK 828D versions antérieures à V4.8 SP5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC PROFINET Driver versions ant\u00e9rieures \u00e0 V2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CFU PA versions ant\u00e9rieures \u00e0 V1.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 V4.7 (Control Unit et CBE20) versions ant\u00e9rieures \u00e0 V4.7 HF34 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GH150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/2 HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN/3 HF versions ant\u00e9rieures \u00e0 V4.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT versions ant\u00e9rieures \u00e0 V5.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G130 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 HF29 ou V5.2 HF2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:DK Standard Ethernet Controller versions ant\u00e9rieures \u00e0 V4.1.1 Patch 05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200P versions ant\u00e9rieures \u00e0 V4.5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GL150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1616 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200MP IM 155-5 PN BA versions ant\u00e9rieures \u00e0 V4.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G110M V4.7 (PN Control Unit) versions ant\u00e9rieures \u00e0 V4.7 SP10 HF5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS DCM versions ant\u00e9rieures \u00e0 V1.5 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS GM150 V4.7 (Control Unit) versions ant\u00e9rieures \u00e0 V4.8 SP2 HF9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IT UADM versions ant\u00e9rieures \u00e0 V1.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Development/Evaluation Kits for PROFINET IO:EK-ERTEC 200 versions ant\u00e9rieures \u00e0 V4.5.0 Patch 01",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400H V6 versions ant\u00e9rieures \u00e0 V6.0.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinAC RTX (F) 2010 versions ant\u00e9rieures \u00e0 SIMATIC WinAC RTX 2010 SP3 avec les mises \u00e0 jour BIOS et Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET 200SP IM 155-6 PN HF versions ant\u00e9rieures \u00e0 V4.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP1604 versions ant\u00e9rieures \u00e0 V2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINUMERIK 828D versions ant\u00e9rieures \u00e0 V4.8 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2019-10936",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10936"
},
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-10923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10923"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2019-13929",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13929"
},
{
"name": "CVE-2019-13921",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13921"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2018-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3615"
}
],
"initial_release_date": "2019-10-08T00:00:00",
"last_revision_date": "2019-10-08T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-489",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-10-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-608355 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-878278 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-878278.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-984700 du 08 octobre 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-984700.pdf"
}
]
}
CERTFR-2020-AVI-420
Vulnerability from certfr_avis - Published: 2020-07-09 - Updated: 2020-07-09
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Junos Space et Junos Space Security Director versions antérieures à 20.1R1 | ||
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos Space et Junos Space Security Director versions ant\u00e9rieures \u00e0 20.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 19.1R3-EVO,19.2R2-EVO, 19.3R1-EVO, 19.3R3-EVO, 19.4R2-EVO, 19.4R2-S2-EVO, 20.1R1-EVO, 20.1R2-EVO et 20.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S15, 12.3X48-D100, 12.3X48-D95, 14.1X53-D140, 14.1X53-D54, 15.1R7-S6, 15.1R7-S7, 15.1X49-D200, 15.1X49-D210, 15.1X49-D230, 15.1X53-D593, 16.1R7-S7, 16.1R7-S8, 17.1R2-S11, 17.1R2-S12, 17.1R3-S2, 17.2R1-S9, 17.2R2-S8, 17.2R3-S3, 17.2R3-S4, 17.2X75-D105.19, 17.3R2-S5, 17.3R3-S6, 17.3R3-S7, 17.3R3-S8, 17.4R1-S3, 17.4R2, 17.4R2-S10, 17.4R2-S11, 17.4R2-S2, 17.4R2-S4, 17.4R2-S8, 17.4R2-S9, 17.4R3, 17.4R3-S1, 17.4R3-S2, 18.1R2, 18.1R3-S10, 18.1R3-S2, 18.1R3-S5, 18.1R3-S8, 18.1R3-S9, 18.2R1, 18.2R2, 18.2R2-S6, 18.2R2-S7, 18.2R3, 18.2R3-S3, 18.2R3-S4, 18.2R3-S5, 18.2X75-D10, 18.2X75-D13, 18.2X75-D32, 18.2X75-D33, 18.2X75-D34, 18.2X75-D40, 18.2X75-D41, 18.2X75-D411.1, 18.2X75-D420, 18.2X75-D420.18, 18.2X75-D430, 18.2X75-D50, 18.2X75-D52, 18.2X75-D52.3, 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60, 18.2X75-D60.2, 18.2X75-D65, 18.2X75-D65.1, 18.2X75-D70, 18.2X75-D70;(*1), 18.3R1-S2, 18.3R1-S7, 18.3R2, 18.3R2-S3, 18.3R2-S4, 18.3R3, 18.3R3-S1, 18.3R3-S2, 18.4R1, 18.4R1-S5, 18.4R1-S6, 18.4R1-S7, 18.4R2, 18.4R2-S4, 18.4R2-S5, 18.4R3, 18.4R3-S1, 18.4R3-S2, 18.4R3-S3(*2), 19.1R1-S4, 19.1R1-S5, 19.1R2, 19.1R2-S1, 19.1R2-S2, 19.1R3, 19.1R3-S2, 19.2R1, 19.2R1-S2, 19.2R1-S3, 19.2R1-S4, 19.2R1-S5, 19.2R2, 19.2R3, 19.3R2, 19.3R2-S2, 19.3R2-S3, 19.3R3, 19.4R1, 19.4R1-S1, 19.4R1-S2, 19.4R1-S3, 19.4R2, 19.4R3, 20.1R1, 20.1R1-S1, 20.1R1-S2, 20.1R2 et 20.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1167"
},
{
"name": "CVE-2016-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2324"
},
{
"name": "CVE-2013-1960",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1960"
},
{
"name": "CVE-2012-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4447"
},
{
"name": "CVE-2016-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3991"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2014-7826",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7826"
},
{
"name": "CVE-2020-1648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1648"
},
{
"name": "CVE-2016-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3621"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2016-6662",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6662"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2009-2347",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2347"
},
{
"name": "CVE-2014-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3634"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2015-1782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1782"
},
{
"name": "CVE-2017-13098",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13098"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2014-7825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7825"
},
{
"name": "CVE-2016-6136",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6136"
},
{
"name": "CVE-2020-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1646"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2012-1173",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1173"
},
{
"name": "CVE-2012-2088",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2088"
},
{
"name": "CVE-2014-9938",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9938"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2020-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1651"
},
{
"name": "CVE-2010-2067",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2067"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2016-3945",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3945"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2020-1645",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1645"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2020-1640",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1640"
},
{
"name": "CVE-2013-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4244"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2020-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1643"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2015-7940",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7940"
},
{
"name": "CVE-2017-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000117"
},
{
"name": "CVE-2012-5581",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5581"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2014-3690",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3690"
},
{
"name": "CVE-2018-1000613",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000613"
},
{
"name": "CVE-2017-12588",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12588"
},
{
"name": "CVE-2016-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0787"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-9555",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9555"
},
{
"name": "CVE-2013-1624",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1624"
},
{
"name": "CVE-2016-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3990"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2018-1000021",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000021"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2014-9679",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9679"
},
{
"name": "CVE-2020-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1647"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2020-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1652"
},
{
"name": "CVE-2017-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14867"
},
{
"name": "CVE-2009-5022",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5022"
},
{
"name": "CVE-2016-1835",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1835"
},
{
"name": "CVE-2019-3856",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
},
{
"name": "CVE-2020-1650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1650"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2019-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2013-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0169"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2008-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2327"
},
{
"name": "CVE-2017-9935",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9935"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5382",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5382"
},
{
"name": "CVE-2014-9584",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9584"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2016-5616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5616"
},
{
"name": "CVE-2015-1421",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1421"
},
{
"name": "CVE-2014-9529",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9529"
},
{
"name": "CVE-2020-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1654"
},
{
"name": "CVE-2013-1961",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1961"
},
{
"name": "CVE-2015-7082",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7082"
},
{
"name": "CVE-2006-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2193"
},
{
"name": "CVE-2014-8171",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8171"
},
{
"name": "CVE-2006-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2656"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2018-11233",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11233"
},
{
"name": "CVE-2013-4232",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4232"
},
{
"name": "CVE-2013-4243",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4243"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2011-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3200"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2017-15298",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15298"
},
{
"name": "CVE-2014-8884",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8884"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2020-1641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1641"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2013-4758",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4758"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2016-5314",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5314"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2010-2065",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2065"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2010-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1411"
},
{
"name": "CVE-2016-3632",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3632"
},
{
"name": "CVE-2019-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
},
{
"name": "CVE-2015-7547",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7547"
},
{
"name": "CVE-2020-1649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1649"
},
{
"name": "CVE-2019-3857",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
},
{
"name": "CVE-2012-4564",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4564"
},
{
"name": "CVE-2012-2113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2113"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2014-3215",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3215"
},
{
"name": "CVE-2018-11235",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11235"
},
{
"name": "CVE-2016-6663",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6663"
},
{
"name": "CVE-2018-19486",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19486"
},
{
"name": "CVE-2015-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7545"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2019-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2018-5360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5360"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2020-1644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1644"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
},
{
"name": "CVE-2012-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3401"
},
{
"name": "CVE-2019-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0211"
},
{
"name": "CVE-2014-3683",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3683"
}
],
"initial_release_date": "2020-07-09T00:00:00",
"last_revision_date": "2020-07-09T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11038 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11038\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11024 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11024\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11026 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11027 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11027\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11035 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11035\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11023 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11025 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11025\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11034 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11034\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11033 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11033\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11032 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11032\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11036 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11036\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11031 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11031\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11030 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11030\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11037 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11037\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11028 du 08 juillet 2020",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11028\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-052
Vulnerability from certfr_avis - Published: 2019-02-12 - Updated: 2019-02-12
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC FieldPG M5 versions antérieures à V22.01.06 | ||
| Siemens | N/A | SIMATIC IPC547E versions antérieures à R1.30.0 | ||
| Siemens | N/A | relais SIPROTEC 5, avec des processeurs CP300 ou CP100 et les modules de communication Ethernet listés sur le site du constructeur, versions antérieures à V7.82 | ||
| Siemens | N/A | SIMATIC IPC827D versions antérieures à V19.02.11 | ||
| Siemens | N/A | SIMATIC ITC1900 V3 PRO versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC ITP1000 versions antérieures à V23.01.04 | ||
| Siemens | N/A | SIMATIC IPC847D versions antérieures à V19.01.14 | ||
| Siemens | N/A | SICAM 230 versions antérieures à V7.20 avec WibuKey Digital Rights Management (DRM) versions antérieures à 6.5 | ||
| Siemens | N/A | relais SIPROTEC 5, avec des processeurs CP200 et les modules de communication Ethernet listés sur le site du constructeur, versions antérieures à V7.58 | ||
| Siemens | N/A | Firmware variant IEC 61850 pour module ethernet EN100 versions antérieures à V4.35 | ||
| Siemens | N/A | SIMATIC ITC1500 V3 PRO versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC IPC547G versions antérieures à R1.23.0 | ||
| Siemens | N/A | SIMATIC IPC477E versions antérieures à V21.01.09 | ||
| Siemens | N/A | SIMATIC ITC2200 V3 PRO versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC IPC677D versions antérieures à V19.02.11 | ||
| Siemens | N/A | SIMATIC ITC2200 V3 versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC IPC627D versions antérieures à V19.02.11 | ||
| Siemens | N/A | SIMATIC IPC427E versions antérieures à V21.01.09 | ||
| Siemens | N/A | SIMATIC IPC647D versions antérieures à V19.01.14 | ||
| Siemens | N/A | SIMATIC ITC1500 V3 versions antérieures à V3.1 | ||
| Siemens | N/A | SIMATIC ITC1900 V3 versions antérieures à V3.1 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC FieldPG M5 versions ant\u00e9rieures \u00e0 V22.01.06",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC547E versions ant\u00e9rieures \u00e0 R1.30.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "relais SIPROTEC 5, avec des processeurs CP300 ou CP100 et les modules de communication Ethernet list\u00e9s sur le site du constructeur, versions ant\u00e9rieures \u00e0 V7.82",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC827D versions ant\u00e9rieures \u00e0 V19.02.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC1900 V3 PRO versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITP1000 versions ant\u00e9rieures \u00e0 V23.01.04",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC847D versions ant\u00e9rieures \u00e0 V19.01.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM 230 versions ant\u00e9rieures \u00e0 V7.20 avec WibuKey Digital Rights Management (DRM) versions ant\u00e9rieures \u00e0 6.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "relais SIPROTEC 5, avec des processeurs CP200 et les modules de communication Ethernet list\u00e9s sur le site du constructeur, versions ant\u00e9rieures \u00e0 V7.58",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Firmware variant IEC 61850 pour module ethernet EN100 versions ant\u00e9rieures \u00e0 V4.35",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC1500 V3 PRO versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC547G versions ant\u00e9rieures \u00e0 R1.23.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC477E versions ant\u00e9rieures \u00e0 V21.01.09",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC2200 V3 PRO versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC677D versions ant\u00e9rieures \u00e0 V19.02.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC2200 V3 versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC627D versions ant\u00e9rieures \u00e0 V19.02.11",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC427E versions ant\u00e9rieures \u00e0 V21.01.09",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC647D versions ant\u00e9rieures \u00e0 V19.01.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC1500 V3 versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ITC1900 V3 versions ant\u00e9rieures \u00e0 V3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-16563",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16563"
},
{
"name": "CVE-2018-3991",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3991"
},
{
"name": "CVE-2018-3990",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3990"
},
{
"name": "CVE-2018-3989",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3989"
},
{
"name": "CVE-2018-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3657"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3658"
},
{
"name": "CVE-2018-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3616"
}
],
"initial_release_date": "2019-02-12T00:00:00",
"last_revision_date": "2019-02-12T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-052",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "SCADA Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-377318 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-505225 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-760124 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-104088 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-104088.pdf"
}
]
}
CERTFR-2018-AVI-250
Vulnerability from certfr_avis - Published: 2018-05-23 - Updated: 2018-05-23
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 17.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-18193",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18193"
},
{
"name": "CVE-2017-17975",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17975"
},
{
"name": "CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"name": "CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"name": "CVE-2018-7480",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7480"
},
{
"name": "CVE-2017-13220",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13220"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18221",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18221"
},
{
"name": "CVE-2018-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7757"
},
{
"name": "CVE-2017-18079",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18079"
},
{
"name": "CVE-2017-18222",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18222"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7995"
},
{
"name": "CVE-2017-17449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17449"
},
{
"name": "CVE-2017-18204",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18204"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2017-12134",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12134"
}
],
"initial_release_date": "2018-05-23T00:00:00",
"last_revision_date": "2018-05-23T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-250",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu . Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de\ncode arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3655-2 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3655-1 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3652-1 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3653-2 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3653-1 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3654-2 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-3654-1 du 22 mai 2018",
"url": "https://usn.ubuntu.com/3654-1/"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis - Published: 2019-01-10 - Updated: 2019-01-10
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"initial_release_date": "2019-01-10T00:00:00",
"last_revision_date": "2019-01-10T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-330
Vulnerability from certfr_avis - Published: 2018-07-11 - Updated: 2018-07-11
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat . Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 6 x86_64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
}
],
"initial_release_date": "2018-07-11T00:00:00",
"last_revision_date": "2018-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-330",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat . Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:2165 du 10 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2165"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2018:2164 du 10 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
}
]
}
CERTFR-2019-AVI-023
Vulnerability from certfr_avis - Published: 2019-01-16 - Updated: 2019-01-16
De multiples vulnérabilités ont été découvertes dans Oracle Sun Systems. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tape Library ACSLS version 8.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Sun ZFS Storage Appliance Kit (AK) versions ant\u00e9rieures \u00e0 8.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris versions 10 et 11",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-6913",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6913"
},
{
"name": "CVE-2017-1000456",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000456"
},
{
"name": "CVE-2018-19628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19628"
},
{
"name": "CVE-2018-19158",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19158"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2017-14517",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14517"
},
{
"name": "CVE-2018-3282",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3282"
},
{
"name": "CVE-2016-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0635"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-1000115",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000115"
},
{
"name": "CVE-2018-9918",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9918"
},
{
"name": "CVE-2019-2545",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2545"
},
{
"name": "CVE-2019-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2541"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2019-2544",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2544"
},
{
"name": "CVE-2018-3247",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3247"
},
{
"name": "CVE-2018-1275",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1275"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2019-2543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2543"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2019-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2412"
},
{
"name": "CVE-2016-8705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8705"
},
{
"name": "CVE-2018-17183",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17183"
},
{
"name": "CVE-2019-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2437"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-3070",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3070"
},
{
"name": "CVE-2018-15909",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15909"
},
{
"name": "CVE-2018-11763",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11763"
}
],
"initial_release_date": "2019-01-16T00:00:00",
"last_revision_date": "2019-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-023",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Sun Systems.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019-5072801 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixSUNS"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle bulletinjan2019-5251593 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/topics/security/bulletinjan2019-5251593.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2019verbose-5072807 du 15 janvier 2019",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019verbose-5072807.html#SUNS"
}
]
}
CERTFR-2018-AVI-363
Vulnerability from certfr_avis - Published: 2018-07-30 - Updated: 2018-08-02
Une vulnérabilité a été découverte dans Xen. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen pour syst\u00e8mes Linux 64-bit x86 PV",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-14678",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14678"
}
],
"initial_release_date": "2018-07-30T00:00:00",
"last_revision_date": "2018-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-363",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-30T00:00:00.000000"
},
{
"description": "Ajout de la r\u00e9f\u00e9rence CVE",
"revision_date": "2018-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Xen. Elle permet \u00e0 un attaquant\nde provoquer un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-274 du 25 juillet 2018",
"url": "http://xenbits.xen.org/xsa/advisory-274.html"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: 2022-03-23 - Updated: 2022-03-23
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2018-AVI-386
Vulnerability from certfr_avis - Published: 2018-08-16 - Updated: 2018-08-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 6 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64 | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 6.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 et x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 6.7 s390x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 6.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 6.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 6.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 6.7 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386 et x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 6.7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2017-13215",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13215"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
}
],
"initial_release_date": "2018-08-16T00:00:00",
"last_revision_date": "2018-08-16T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-386",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2392 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2389 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2389"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2393 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2384 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2396 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2388 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2388"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2390 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2391 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2387 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2394 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2395 du 14 ao\u00fbt 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
}
]
}
CERTFR-2018-AVI-258
Vulnerability from certfr_avis - Published: 2018-05-25 - Updated: 2018-05-25
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.3 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.3 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.3 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.3 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.3 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (pour IBM Power LE) - Update Services pour SAP Solutions 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.3 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.4 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-05-25T00:00:00",
"last_revision_date": "2018-05-25T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-258",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1636 du 22 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1635 du 22 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
}
]
}
CERTFR-2018-AVI-248
Vulnerability from certfr_avis - Published: 2018-05-22 - Updated: 2018-05-22
Une vulnérabilité a été découverte dans le noyau Linux de RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 6 ppc64 | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 6 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-05-22T00:00:00",
"last_revision_date": "2018-05-22T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-248",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de RedHat. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1630 du 21 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1629 du 21 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1642 du 21 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1651 du 21 mai 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
}
]
}
CERTFR-2018-AVI-256
Vulnerability from certfr_avis - Published: 2018-05-25 - Updated: 2018-05-25
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Point of Sale 11-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4 | ||
| SUSE | N/A | OpenStack Cloud Magnum Orchestration 7 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform ALL | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 | ||
| SUSE | N/A | SUSE Enterprise Storage 4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server pour SAP 12-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 11-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Point of Sale 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "OpenStack Cloud Magnum Orchestration 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform ALL",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server pour SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
}
],
"initial_release_date": "2018-05-25T00:00:00",
"last_revision_date": "2018-05-25T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-05-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1366-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1376-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1375-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1368-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1377-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2018:1374-1 du 22 mai 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1/"
}
]
}
CERTFR-2018-AVI-306
Vulnerability from certfr_avis - Published: 2018-06-27 - Updated: 2018-06-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 7 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power 9 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux pour Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time pour NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 7 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM System z (Structure A) 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power 9 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-06-27T00:00:00",
"last_revision_date": "2018-06-27T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-306",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1967 du 26 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:1965 du 26 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2003 du 26 juin 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
}
]
}
CERTFR-2018-AVI-505
Vulnerability from certfr_avis - Published: 2018-10-19 - Updated: 2018-10-19
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE . Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-1000199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000199"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"name": "CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"name": "CVE-2018-7492",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7492"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2018-9385",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9385"
},
{
"name": "CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"name": "CVE-2018-13406",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13406"
},
{
"name": "CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"name": "CVE-2017-18241",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18241"
},
{
"name": "CVE-2018-10124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10124"
},
{
"name": "CVE-2018-13053",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13053"
},
{
"name": "CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"name": "CVE-2018-17182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17182"
},
{
"name": "CVE-2018-8822",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8822"
},
{
"name": "CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"name": "CVE-2017-18249",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18249"
},
{
"name": "CVE-2018-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8043"
},
{
"name": "CVE-2018-10087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10087"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"name": "CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2017-18257",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18257"
},
{
"name": "CVE-2018-14633",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14633"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2018-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1093"
},
{
"name": "CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"name": "CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"name": "CVE-2018-5814",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5814"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2017-13305",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13305"
},
{
"name": "CVE-2018-14734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14734"
},
{
"name": "CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"name": "CVE-2018-7740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7740"
}
],
"initial_release_date": "2018-10-19T00:00:00",
"last_revision_date": "2018-10-19T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-505",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-10-19T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"revision_date": "2018-10-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE . Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20183238-1 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183238-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181571-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181855-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20182344-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182344-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181377-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20181173-2 du 18 octobre 2018",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-2/"
}
]
}
CERTFR-2018-AVI-346
Vulnerability from certfr_avis - Published: 2018-07-18 - Updated: 2018-07-18
Une vulnérabilité a été découverte dans le noyau Linux de RedHat. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services pour SAP Solutions 7.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-07-18T00:00:00",
"last_revision_date": "2018-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-346",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le noyau Linux de RedHat. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2018:2216 du 17 juillet 2018",
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
}
]
}
CERTFR-2023-AVI-0664
Vulnerability from certfr_avis - Published: 2023-08-18 - Updated: 2023-08-18
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | Legacy Module 15-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP2 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | Legacy Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | openSUSE Leap | openSUSE Leap Micro 5.4 | ||
| SUSE | N/A | Development Tools Module 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP5 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP4",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP5",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP4",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-20784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20784"
},
{
"name": "CVE-2023-21400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21400"
},
{
"name": "CVE-2023-3390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
},
{
"name": "CVE-2023-4004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4004"
},
{
"name": "CVE-2023-3117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3117"
},
{
"name": "CVE-2023-3159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3159"
},
{
"name": "CVE-2023-2985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2985"
},
{
"name": "CVE-2023-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3106"
},
{
"name": "CVE-2023-31248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31248"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-3090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3111"
},
{
"name": "CVE-2023-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38409"
},
{
"name": "CVE-2023-2430",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2430"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3863"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2023-35001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-1637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1637"
},
{
"name": "CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3389"
}
],
"initial_release_date": "2023-08-18T00:00:00",
"last_revision_date": "2023-08-18T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0664",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3324-1 du 16 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233324-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3298-1 du 11 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233298-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3318-1 du 15 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233318-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3311-1 du 14 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233311-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3309-1 du 14 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233309-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3333-1 du 16 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233333-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3349-1 du 17 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233349-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3302-1 du 14 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233302-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3313-1 du 14 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233313-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2023:3329-1 du 16 ao\u00fbt 2023",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233329-1/"
}
]
}
RHSA-2018:2258
Vulnerability from csaf_redhat - Published: 2018-07-25 14:18 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform\n12.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products.\n\nSecurity fix(es):\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nAcknowledgements:\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center)\nand Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2258",
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2258.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:37+00:00",
"generator": {
"date": "2025-11-21T18:05:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2258",
"initial_release_date": "2018-07-25T14:18:37+00:00",
"revision_history": [
{
"date": "2018-07-25T14:18:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-25T14:18:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 12.0",
"product": {
"name": "Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:12::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-25T14:18:37+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1854
Vulnerability from csaf_redhat - Published: 2018-06-19 04:58 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\n* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)\n\n* kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701)\n\n* kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)\n\n* kernel: Null pointer dereference via keyctl (CVE-2016-8650)\n\n* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)\n\n* kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001)\n\n* kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616)\n\n* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889)\n\n* kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890)\n\n* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075)\n\n* kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076)\n\n* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)\n\n* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130)\n\n* kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Vitaly Mayatskih for reporting CVE-2017-12190; and Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1854",
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html"
},
{
"category": "external",
"summary": "869942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=869942"
},
{
"category": "external",
"summary": "1314275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275"
},
{
"category": "external",
"summary": "1314288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288"
},
{
"category": "external",
"summary": "1395187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187"
},
{
"category": "external",
"summary": "1422825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825"
},
{
"category": "external",
"summary": "1436649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649"
},
{
"category": "external",
"summary": "1437404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404"
},
{
"category": "external",
"summary": "1441088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088"
},
{
"category": "external",
"summary": "1444493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493"
},
{
"category": "external",
"summary": "1448170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448170"
},
{
"category": "external",
"summary": "1450972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972"
},
{
"category": "external",
"summary": "1452688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688"
},
{
"category": "external",
"summary": "1452691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691"
},
{
"category": "external",
"summary": "1452744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744"
},
{
"category": "external",
"summary": "1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "1497152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497152"
},
{
"category": "external",
"summary": "1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "external",
"summary": "1551051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051"
},
{
"category": "external",
"summary": "1560494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560494"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1576419",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1854.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:11+00:00",
"generator": {
"date": "2025-11-21T18:05:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1854",
"initial_release_date": "2018-06-19T04:58:56+00:00",
"revision_history": [
{
"date": "2018-06-19T04:58:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-19T04:58:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.el6.x86_64",
"product_id": "perf-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.el6.i686",
"product_id": "perf-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.el6.i686",
"product_id": "kernel-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.el6.i686",
"product_id": "python-perf-0:2.6.32-754.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.el6.src",
"product_id": "kernel-0:2.6.32-754.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.el6.s390x",
"product_id": "perf-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.el6.s390x",
"product_id": "kernel-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.el6.ppc64",
"product_id": "perf-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-754.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.el6.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6701",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2016-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1314288"
}
],
"notes": [
{
"category": "description",
"text": "It was found that AIO interface didn\u0027t use the proper rw_verify_area() helper function with extended functionality, for example, mandatory locking on the file. Also rw_verify_area() makes extended checks, for example, that the size of the access doesn\u0027t cause overflow of the provided offset limits. This integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6. Future Linux kernel updates for the respective releases might address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2 as the corresponding fix is already present.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-6701"
},
{
"category": "external",
"summary": "RHBZ#1314288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-6701",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6701"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701"
}
],
"release_date": "2012-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access"
},
{
"cve": "CVE-2015-8830",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2016-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1314275"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: AIO write triggers integer overflow in some protocols",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the related AIO vector code is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7. Future Linux kernel updates for the respective releases might address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux MRG-2. This flaw is not currently planned to be addressed in future updates due to MRG-2 being an EUS release. For additional information, refer to the Extended Update Support (EUS) Guide: https://access.redhat.com/articles/rhel-eus.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-8830"
},
{
"category": "external",
"summary": "RHBZ#1314275",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-8830",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8830"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830"
},
{
"category": "external",
"summary": "http://seclists.org/oss-sec/2016/q2/479",
"url": "http://seclists.org/oss-sec/2016/q2/479"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=735",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=735"
}
],
"release_date": "2015-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: AIO write triggers integer overflow in some protocols"
},
{
"cve": "CVE-2016-8650",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2016-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1395187"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Null pointer dereference via keyctl",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels.\n\nThis issue does not affect kernels that ship with Red Hat Enterprise Linux 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8650"
},
{
"category": "external",
"summary": "RHBZ#1395187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8650",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650"
}
],
"release_date": "2016-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Null pointer dereference via keyctl"
},
{
"cve": "CVE-2017-2671",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2017-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1436649"
}
],
"notes": [
{
"category": "description",
"text": "A race condition leading to a NULL pointer dereference was found in the Linux kernel\u0027s Link Layer Control implementation. A local attacker with access to ping sockets could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ping socket / AF_LLC connect() sin_family race",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-2671"
},
{
"category": "external",
"summary": "RHBZ#1436649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671"
}
],
"release_date": "2017-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ping socket / AF_LLC connect() sin_family race"
},
{
"cve": "CVE-2017-6001",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2017-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1422825"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the original fix for CVE-2016-6786 was incomplete. There exist a race between two concurrent sys_perf_event_open() calls when both try and move the same pre-existing software group into a hardware context.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition between multiple sys_perf_event_open() calls",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the perf subsystem where the flaw was found is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-6001"
},
{
"category": "external",
"summary": "RHBZ#1422825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-6001",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001"
}
],
"release_date": "2017-01-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition between multiple sys_perf_event_open() calls"
},
{
"cve": "CVE-2017-7308",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2017-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1437404"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the packet_set_ring() function of the Linux kernel\u0027s networking implementation did not properly validate certain block-size data. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or a privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net/packet: overflow in check for priv area size",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 5.\n\nIn a default or common use of Red Hat Enterprise Linux 6 and 7 this issue does not allow an unprivileged local user elevate their privileges on the system. In order to exploit this issue the attacker needs CAP_NET_RAW capability, which needs to be granted by the administrator to the attacker\u0027s account. Since Red Hat Enterprise Linux 6 does not have namespaces support and Red Hat Enterprise Linux 7 does not have unprivileged user namespaces enabled by default, local unprivileged users also cannot abuse namespaces feature to grant this capability to themselves and elevate their privileges.\n\nSo, this issue does not affect Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 in the default configuration. Future updates for the respective releases will address this issue to secure non-default configurations.\n\nIn the non-default configuration mentioned above only Red Hat Enterprise Linux 7 is vulnerable to a privilege escalation. Red Hat Enterprise Linux 6 is vulnerable only to a denial of service (DoS) due to a system crash, hence the impact on Red Hat Enterprise Linux 6 is rated as being Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7308"
},
{
"category": "external",
"summary": "RHBZ#1437404",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7308",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7308"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html",
"url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html"
}
],
"release_date": "2017-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net/packet: overflow in check for priv area size"
},
{
"cve": "CVE-2017-7616",
"cwe": {
"id": "CWE-390",
"name": "Detection of Error Condition Without Action"
},
"discovery_date": "2017-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1441088"
}
],
"notes": [
{
"category": "description",
"text": "Incorrect error handling in the set_mempolicy() and mbind() compat syscalls in \u0027mm/mempolicy.c\u0027 in the Linux kernel allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 on ppc64 and ppc64le platforms. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and 7 on ppc64 and ppc64le platforms. Future Linux kernel updates for the respective releases might address this issue.\n\nOnly ppc64 and ppc64le hardware platforms are vulnerable. The Linux kernel packages for other platforms which Red Hat ships (i386, x86_64, s390x) are not vulnerable to this security flaw.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux MRG-2 as this product is shipped for x86_64 hardware platform only.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7616"
},
{
"category": "external",
"summary": "RHBZ#1441088",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7616"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616"
}
],
"release_date": "2017-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c"
},
{
"cve": "CVE-2017-7889",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"discovery_date": "2017-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1444493"
}
],
"notes": [
{
"category": "description",
"text": "The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7889"
},
{
"category": "external",
"summary": "RHBZ#1444493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7889",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889"
}
],
"release_date": "2017-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism"
},
{
"cve": "CVE-2017-8890",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1450972"
}
],
"notes": [
{
"category": "description",
"text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-8890"
},
{
"category": "external",
"summary": "RHBZ#1450972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-8890",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890"
}
],
"release_date": "2017-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c"
},
{
"cve": "CVE-2017-9075",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452691"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: sctp_v6_create_accept_sk function mishandles inheritance",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9075"
},
{
"category": "external",
"summary": "RHBZ#1452691",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9075",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075"
}
],
"release_date": "2017-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: sctp_v6_create_accept_sk function mishandles inheritance"
},
{
"cve": "CVE-2017-9076",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452688"
}
],
"notes": [
{
"category": "description",
"text": "The IPv6 DCCP implementation in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: IPv6 DCCP implementation mishandles inheritance",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9076"
},
{
"category": "external",
"summary": "RHBZ#1452688",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076"
}
],
"release_date": "2017-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: IPv6 DCCP implementation mishandles inheritance"
},
{
"cve": "CVE-2017-9077",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-05-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452744"
}
],
"notes": [
{
"category": "description",
"text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-9077"
},
{
"category": "external",
"summary": "RHBZ#1452744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-9077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9077"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077"
}
],
"release_date": "2017-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance"
},
{
"acknowledgments": [
{
"names": [
"Vitaly Mayatskih"
]
}
],
"cve": "CVE-2017-12190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2017-09-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1495089"
}
],
"notes": [
{
"category": "description",
"text": "It was found that in the Linux kernel through v4.14-rc5, bio_map_user_iov() and bio_unmap_user() in \u0027block/bio.c\u0027 do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page() merges them into one, but the page reference is never dropped, causing a memory leak and possible system lockup due to out-of-memory condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: memory leak when merging buffers in SCSI IO vectors",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-12190"
},
{
"category": "external",
"summary": "RHBZ#1495089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12190"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190"
}
],
"release_date": "2017-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: memory leak when merging buffers in SCSI IO vectors"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2017-15121",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1520893"
}
],
"notes": [
{
"category": "description",
"text": "A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.\n\nThis issue affects the versions of the Linux kernel as shipped with 6, 7 and Red Hat Enterprise MRG 2. Future updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-15121"
},
{
"category": "external",
"summary": "RHBZ#1520893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-15121",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15121"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121"
}
],
"release_date": "2017-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client"
},
{
"cve": "CVE-2017-18203",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550811"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel, before version 4.14.3, is vulnerable to a denial of service in drivers/md/dm.c:dm_get_from_kobject() which can be caused by local users leveraging a race condition with __dm_destroy() during creation and removal of DM devices. Only privileged local users (with CAP_SYS_ADMIN capability) can directly perform the ioctl operations for dm device creation and removal and this would typically be outside the direct control of the unprivileged attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the code with the flaw is not present in this product.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18203"
},
{
"category": "external",
"summary": "RHBZ#1550811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18203",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203"
}
],
"release_date": "2017-11-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service"
},
{
"acknowledgments": [
{
"names": [
"Evgenii Shatokhin"
],
"organization": "Virtuozzo Team"
}
],
"cve": "CVE-2018-1130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1576419"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in the Linux kernel allows a local user to cause a denial of service by a number of certain crafted system calls.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1130"
},
{
"category": "external",
"summary": "RHBZ#1576419",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1130"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130"
}
],
"release_date": "2018-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"cve": "CVE-2018-5803",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1551051"
}
],
"notes": [
{
"category": "description",
"text": "An error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "RHBZ#1551051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803"
}
],
"release_date": "2018-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-19T04:58:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-optional:kernel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-0:2.6.32-754.el6.src",
"6Client-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.i686",
"6Client-optional:perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-0:2.6.32-754.el6.i686",
"6Client:kernel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-0:2.6.32-754.el6.s390x",
"6Client:kernel-0:2.6.32-754.el6.src",
"6Client:kernel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Client:kernel-devel-0:2.6.32-754.el6.i686",
"6Client:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Client:kernel-devel-0:2.6.32-754.el6.s390x",
"6Client:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Client:kernel-doc-0:2.6.32-754.el6.noarch",
"6Client:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Client:kernel-headers-0:2.6.32-754.el6.i686",
"6Client:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Client:kernel-headers-0:2.6.32-754.el6.s390x",
"6Client:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Client:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.i686",
"6Client:perf-0:2.6.32-754.el6.ppc64",
"6Client:perf-0:2.6.32-754.el6.s390x",
"6Client:perf-0:2.6.32-754.el6.x86_64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-0:2.6.32-754.el6.i686",
"6Client:python-perf-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-0:2.6.32-754.el6.s390x",
"6Client:python-perf-0:2.6.32-754.el6.x86_64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.src",
"6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-0:2.6.32-754.el6.src",
"6ComputeNode:kernel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64",
"6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-0:2.6.32-754.el6.src",
"6Server-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.i686",
"6Server-optional:perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-0:2.6.32-754.el6.i686",
"6Server:kernel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-0:2.6.32-754.el6.s390x",
"6Server:kernel-0:2.6.32-754.el6.src",
"6Server:kernel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Server:kernel-devel-0:2.6.32-754.el6.i686",
"6Server:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Server:kernel-devel-0:2.6.32-754.el6.s390x",
"6Server:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Server:kernel-doc-0:2.6.32-754.el6.noarch",
"6Server:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Server:kernel-headers-0:2.6.32-754.el6.i686",
"6Server:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Server:kernel-headers-0:2.6.32-754.el6.s390x",
"6Server:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Server:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.i686",
"6Server:perf-0:2.6.32-754.el6.ppc64",
"6Server:perf-0:2.6.32-754.el6.s390x",
"6Server:perf-0:2.6.32-754.el6.x86_64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-0:2.6.32-754.el6.i686",
"6Server:python-perf-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-0:2.6.32-754.el6.s390x",
"6Server:python-perf-0:2.6.32-754.el6.x86_64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-0:2.6.32-754.el6.src",
"6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-0:2.6.32-754.el6.src",
"6Workstation:kernel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686",
"6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.i686",
"6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-devel-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-doc-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch",
"6Workstation:kernel-headers-0:2.6.32-754.el6.i686",
"6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64",
"6Workstation:kernel-headers-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64",
"6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.i686",
"6Workstation:perf-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-0:2.6.32-754.el6.s390x",
"6Workstation:perf-0:2.6.32-754.el6.x86_64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-0:2.6.32-754.el6.x86_64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x",
"6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service"
}
]
}
RHSA-2018:1965
Vulnerability from csaf_redhat - Published: 2018-06-26 16:56 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC, x86 AMD)\n\n* kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message (CVE-2017-11600)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485871",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1965",
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3485871",
"url": "https://access.redhat.com/articles/3485871"
},
{
"category": "external",
"summary": "1474928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1965.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:15+00:00",
"generator": {
"date": "2025-11-21T18:05:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1965",
"initial_release_date": "2018-06-26T16:56:22+00:00",
"revision_history": [
{
"date": "2018-06-26T16:56:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T16:56:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "perf-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.6.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.6.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.6.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.6.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.6.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.6.3.el7.src",
"product_id": "kernel-0:3.10.0-862.6.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.6.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x",
"product_id": "perf-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.6.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.6.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "perf-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.6.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.6.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.6.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.6.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1474928"
}
],
"notes": [
{
"category": "description",
"text": "The xfrm_migrate() function in the net/xfrm/xfrm_policy.c file in the Linux kernel built with CONFIG_XFRM_MIGRATE does not verify if the dir parameter is less than XFRM_POLICY_MAX. This allows a local attacker to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact by sending a XFRM_MSG_MIGRATE netlink message. This flaw is present in the Linux kernel since an introduction of XFRM_MSG_MIGRATE in 2.6.21-rc1, up to 4.13-rc3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed or is not exploitable.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for these products may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "RHBZ#1474928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11600"
}
],
"release_date": "2017-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:56:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:56:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.6.3.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.6.3.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.6.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1997
Vulnerability from csaf_redhat - Published: 2018-06-26 16:59 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the virtlogd service logged redundant AVC denial errors when a guest virtual machine was started. With this update, the virtlogd service no longer attempts to send shutdown inhibition calls to systemd, which prevents the described errors from occurring. (BZ#1573268)\n\n* Prior to this update, guest virtual machine actions that use a python library in some cases failed and \"Hash operation not allowed during iteration\" error messages were logged. Several redundant thread access checks have been removed, and the problem no longer occurs. (BZ#1581364)\n\n* The \"virsh capabilities\" command previously displayed an inaccurate number of 4 KiB memory pages on systems with very large amounts of memory. This update optimizes the memory diagnostic mechanism to ensure memory page numbers are displayed correctly on such systems. (BZ#1582418)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1997",
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1573268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573268"
},
{
"category": "external",
"summary": "1581364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581364"
},
{
"category": "external",
"summary": "1582418",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582418"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1997.json"
}
],
"title": "Red Hat Security Advisory: libvirt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:18+00:00",
"generator": {
"date": "2025-11-21T18:05:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1997",
"initial_release_date": "2018-06-26T16:59:24+00:00",
"revision_history": [
{
"date": "2018-06-26T16:59:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T16:59:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-rbd@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-gluster@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.src",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:59:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.6.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1653
Vulnerability from csaf_redhat - Published: 2018-05-22 01:43 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1653",
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1653.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:55+00:00",
"generator": {
"date": "2025-11-21T18:04:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1653",
"initial_release_date": "2018-05-22T01:43:49+00:00",
"revision_history": [
{
"date": "2018-05-22T01:43:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:43:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.12?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.12.src",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.12.src",
"product_id": "libvirt-0:2.0.0-10.el7_3.12.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.12?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.12?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.12?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.12?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.12?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.12?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:43:49+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.12.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.12.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1689
Vulnerability from csaf_redhat - Published: 2018-05-22 07:51 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhevm-setup-plugins is now available for RHEV Manager version 3.6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhevm-setup-plugins package adds functionality exclusive only to Red Hat Virtualization Manager, and is not available for the upstream ovirt-engine. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.\n\nThe following packages have been upgraded to a later upstream version: rhevm-setup-plugins (3.6.7). (BZ#1579010)\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the rhevm-setup-plugins side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1689",
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1689.json"
}
],
"title": "Red Hat Security Advisory: rhevm-setup-plugins security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1689",
"initial_release_date": "2018-05-22T07:51:10+00:00",
"revision_history": [
{
"date": "2018-05-22T07:51:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T07:51:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-M 3.6 ELS",
"product": {
"name": "RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.src",
"product": {
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.src",
"product_id": "rhevm-setup-plugins-0:3.6.7-1.el6ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugins@3.6.7-1.el6ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"product": {
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"product_id": "rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugins@3.6.7-1.el6ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch"
},
"product_reference": "rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugins-0:3.6.7-1.el6ev.src as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.src"
},
"product_reference": "rhevm-setup-plugins-0:3.6.7-1.el6ev.src",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T07:51:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugins-0:3.6.7-1.el6ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1635
Vulnerability from csaf_redhat - Published: 2018-05-22 17:04 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1635",
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1635.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1635",
"initial_release_date": "2018-05-22T17:04:54+00:00",
"revision_history": [
{
"date": "2018-05-22T17:04:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T17:04:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "perf-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.7.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.25.7.el7.s390x",
"product_id": "perf-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.25.7.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.25.7.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "perf-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.7.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.7.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.25.7.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.25.7.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.25.7.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.25.7.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.25.7.el7.src",
"product_id": "kernel-0:3.10.0-693.25.7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.25.7.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.25.7.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T17:04:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.25.7.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.25.7.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.25.7.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1649
Vulnerability from csaf_redhat - Published: 2018-05-22 01:38 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1649",
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1649.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:54+00:00",
"generator": {
"date": "2025-11-21T18:04:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1649",
"initial_release_date": "2018-05-22T01:38:54+00:00",
"revision_history": [
{
"date": "2018-05-22T01:38:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:38:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_id": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-debug@1.8.0.171-8.b10.el7_5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_id": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-debug@1.8.0.171-8.b10.el7_5?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.171-8.b10.el7_5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-debug@1.8.0.171-8.b10.el7_5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip-debug@1.8.0.171-8.b10.el7_5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.171-8.b10.el7_5?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_id": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-debug@1.8.0.171-8.b10.el7_5?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_id": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-debug@1.8.0.171-8.b10.el7_5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_id": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-debug@1.8.0.171-8.b10.el7_5?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:38:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-accessibility-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-javadoc-zip-debug-1:1.8.0.171-8.b10.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.i686",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el7_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1688
Vulnerability from csaf_redhat - Published: 2018-05-22 07:51 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for org.ovirt.engine-root is now available for RHEV Manager version 3.6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The org.ovirt.engine-root is a core component of oVirt.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the org.ovirt.engine-root side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1688",
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1688.json"
}
],
"title": "Red Hat Security Advisory: org.ovirt.engine-root security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1688",
"initial_release_date": "2018-05-22T07:51:17+00:00",
"revision_history": [
{
"date": "2018-05-22T07:51:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T07:51:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-M 3.6 ELS",
"product": {
"name": "RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-extensions-api-impl@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-vmconsole-proxy-helper@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-webadmin-portal@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-dbscripts@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-restapi@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-backend@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-lib@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-tools@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-extensions-api-impl-javadoc@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-base@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-ovirt-engine@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-websocket-proxy@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-websocket-proxy@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-webadmin-portal-debuginfo@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-userportal-debuginfo@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-setup-plugin-ovirt-engine-common@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-tools-backup@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-vmconsole-proxy-helper@3.6.13.2-0.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"product": {
"name": "rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"product_id": "rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm-userportal@3.6.13.2-0.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "rhevm-0:3.6.13.2-0.1.el6.src",
"product": {
"name": "rhevm-0:3.6.13.2-0.1.el6.src",
"product_id": "rhevm-0:3.6.13.2-0.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhevm@3.6.13.2-0.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-0:3.6.13.2-0.1.el6.src as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.src"
},
"product_reference": "rhevm-0:3.6.13.2-0.1.el6.src",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-backend-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-backend-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-lib-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-lib-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-restapi-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-restapi-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-tools-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-tools-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-userportal-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-userportal-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch as a component of RHEV-M 3.6 ELS",
"product_id": "6Server-RHEV-S-3.6-ELS:rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch"
},
"product_reference": "rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.6-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.src",
"6Server-RHEV-S-3.6-ELS:rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T07:51:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.src",
"6Server-RHEV-S-3.6-ELS:rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-0:3.6.13.2-0.1.el6.src",
"6Server-RHEV-S-3.6-ELS:rhevm-backend-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-dbscripts-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-extensions-api-impl-javadoc-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-lib-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-restapi-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-base-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-ovirt-engine-common-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-setup-plugin-websocket-proxy-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-tools-backup-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-userportal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-vmconsole-proxy-helper-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-webadmin-portal-debuginfo-0:3.6.13.2-0.1.el6.noarch",
"6Server-RHEV-S-3.6-ELS:rhevm-websocket-proxy-0:3.6.13.2-0.1.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3407
Vulnerability from csaf_redhat - Published: 2018-10-30 17:01 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3407",
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3407.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:42+00:00",
"generator": {
"date": "2025-11-21T18:06:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3407",
"initial_release_date": "2018-10-30T17:01:13+00:00",
"revision_history": [
{
"date": "2018-10-30T17:01:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T17:01:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@1.2.17-13.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"product_id": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@1.2.17-13.el7_2.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"product": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"product_id": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@1.2.17-13.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"product": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"product_id": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@1.2.17-13.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"product": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"product_id": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@1.2.17-13.el7_2.9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:1.2.17-13.el7_2.9.src",
"product": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src",
"product_id": "libvirt-0:1.2.17-13.el7_2.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@1.2.17-13.el7_2.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T17:01:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.9.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1632
Vulnerability from csaf_redhat - Published: 2018-05-22 01:39 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1632",
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1632.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:50+00:00",
"generator": {
"date": "2025-11-21T18:04:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1632",
"initial_release_date": "2018-05-22T01:39:38+00:00",
"revision_history": [
{
"date": "2018-05-22T01:39:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:39:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-rbd@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-gluster@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.src",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.9.0-14.el7_5.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product_id": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.9.0-14.el7_5.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
},
"product_reference": "libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:39:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Client-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Client-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7ComputeNode-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7ComputeNode-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Server-optional-Alt-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Server-optional-Alt-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.src",
"7Workstation-optional-7.5.Z:libvirt-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-admin-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-client-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-config-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-interface-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-network-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nodedev-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-nwfilter-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-qemu-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-secret-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-core-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-disk-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-gluster-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-iscsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-logical-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-mpath-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-rbd-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-driver-storage-scsi-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-kvm-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-daemon-lxc-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-debuginfo-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-devel-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-docs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-libs-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-lock-sanlock-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-login-shell-0:3.9.0-14.el7_5.5.x86_64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.aarch64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.i686",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.ppc64le",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.s390x",
"7Workstation-optional-7.5.Z:libvirt-nss-0:3.9.0-14.el7_5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1667
Vulnerability from csaf_redhat - Published: 2018-05-22 01:40 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1667",
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1667.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:59+00:00",
"generator": {
"date": "2025-11-21T18:04:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1667",
"initial_release_date": "2018-05-22T01:40:19+00:00",
"revision_history": [
{
"date": "2018-05-22T01:40:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:40:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-54.el6_7.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.8.i686",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.8.i686",
"product_id": "libvirt-0:0.10.2-54.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.8.src",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.8.src",
"product_id": "libvirt-0:0.10.2-54.el6_7.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"product_id": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"product_id": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.8?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:40:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1662
Vulnerability from csaf_redhat - Published: 2018-05-22 01:40 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1662",
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1662.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1662",
"initial_release_date": "2018-05-22T01:40:36+00:00",
"revision_history": [
{
"date": "2018-05-22T01:40:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:40:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.14?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"product_id": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-126.el7_3.14?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"product_id": "qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.14?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-126.el7_3.14?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-126.el7_3.14?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.src",
"product": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.src",
"product_id": "qemu-kvm-10:1.5.3-126.el7_3.14.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-126.el7_3.14?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.14?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"product_id": "qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.14?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-126.el7_3.14?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"product": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"product_id": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-126.el7_3.14?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.14.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.14.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:40:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7ComputeNode-optional-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-img-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.src",
"7Server-7.3.EUS:qemu-kvm-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-common-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.ppc64le",
"7Server-7.3.EUS:qemu-kvm-debuginfo-10:1.5.3-126.el7_3.14.x86_64",
"7Server-7.3.EUS:qemu-kvm-tools-10:1.5.3-126.el7_3.14.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1665
Vulnerability from csaf_redhat - Published: 2018-05-22 01:39 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1665",
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1665.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:59+00:00",
"generator": {
"date": "2025-11-21T18:04:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1665",
"initial_release_date": "2018-05-22T01:39:52+00:00",
"revision_history": [
{
"date": "2018-05-22T01:39:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:39:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-29.el6_5.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-29.el6_5.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-29.el6_5.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-29.el6_5.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-29.el6_5.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"product_id": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-29.el6_5.16?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-29.el6_5.16.src",
"product": {
"name": "libvirt-0:0.10.2-29.el6_5.16.src",
"product_id": "libvirt-0:0.10.2-29.el6_5.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-29.el6_5.16?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"product_id": "libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-29.el6_5.16?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-29.el6_5.16?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-29.el6_5.16.i686",
"product": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.i686",
"product_id": "libvirt-client-0:0.10.2-29.el6_5.16.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-29.el6_5.16?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.16.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.16.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.16.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.16.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:39:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.16.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.16.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2019:1046
Vulnerability from csaf_redhat - Published: 2019-05-08 12:41 - Updated: 2025-11-21 18:08Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhvm-setup-plugins is now available for Red Hat Virtualization Engine 4.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhvm-setup-plugins package adds functionality exclusive only to Red Hat Virtualization Manager, and is not available for the upstream ovirt-engine. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. (CVE-2017-5754)\n\nBug Fix(es):\n\n* [CVE-2017-5754] Variant3: POWER {qemu-kvm-rhev} Add machine type variants (BZ#1559948)\n\n* add POWER 9 to the 4.2 cluster level (BZ#1574494)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1046",
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1519781",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
},
{
"category": "external",
"summary": "1574494",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1574494"
},
{
"category": "external",
"summary": "1627712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627712"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1046.json"
}
],
"title": "Red Hat Security Advisory: rhvm-setup-plugins security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:08:08+00:00",
"generator": {
"date": "2025-11-21T18:08:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:1046",
"initial_release_date": "2019-05-08T12:41:36+00:00",
"revision_history": [
{
"date": "2019-05-08T12:41:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-05-08T12:41:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:08:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHV-M 4.3",
"product": {
"name": "RHV-M 4.3",
"product_id": "7Server-RHV-S-4.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.src",
"product": {
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.src",
"product_id": "rhvm-setup-plugins-0:4.3.0-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.3.0-1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"product": {
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"product_id": "rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.3.0-1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch as a component of RHV-M 4.3",
"product_id": "7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch"
},
"product_reference": "rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.3.0-1.el7ev.src as a component of RHV-M 4.3",
"product_id": "7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.src"
},
"product_reference": "rhvm-setup-plugins-0:4.3.0-1.el7ev.src",
"relates_to_product_reference": "7Server-RHV-S-4.3"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-05-08T12:41:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.noarch",
"7Server-RHV-S-4.3:rhvm-setup-plugins-0:4.3.0-1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1711
Vulnerability from csaf_redhat - Published: 2018-05-23 16:00 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the rhev-hypervisor7 side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1711",
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1711.json"
}
],
"title": "Red Hat Security Advisory: rhev-hypervisor7 security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:04+00:00",
"generator": {
"date": "2025-11-21T18:05:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1711",
"initial_release_date": "2018-05-23T16:00:52+00:00",
"revision_history": [
{
"date": "2018-05-23T16:00:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-23T16:00:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV Hypervisor for RHEL-6 ELS",
"product": {
"name": "RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H ELS",
"product": {
"name": "RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src",
"product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"product_id": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el6ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"product_id": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180521.1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src as a component of RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180521.1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
}
],
"cve": "CVE-2018-1087",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566837"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: error in exception handling leads to wrong debug stack value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1087"
},
{
"category": "external",
"summary": "RHBZ#1566837",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T16:00:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: KVM: error in exception handling leads to wrong debug stack value"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T16:00:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T16:00:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180521.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180521.1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018:2003
Vulnerability from csaf_redhat - Published: 2018-06-26 16:49 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\n* kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message (CVE-2017-11600)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-862.6.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1576058)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2003",
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1474928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1576058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576058"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2003.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:18+00:00",
"generator": {
"date": "2025-11-21T18:05:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2003",
"initial_release_date": "2018-06-26T16:49:43+00:00",
"revision_history": [
{
"date": "2018-06-26T16:49:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T16:49:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.6.3.rt56.811.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"product_id": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.6.3.rt56.811.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.6.3.rt56.811.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-11600",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1474928"
}
],
"notes": [
{
"category": "description",
"text": "The xfrm_migrate() function in the net/xfrm/xfrm_policy.c file in the Linux kernel built with CONFIG_XFRM_MIGRATE does not verify if the dir parameter is less than XFRM_POLICY_MAX. This allows a local attacker to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact by sending a XFRM_MSG_MIGRATE netlink message. This flaw is present in the Linux kernel since an introduction of XFRM_MSG_MIGRATE in 2.6.21-rc1, up to 4.13-rc3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 as the code with the flaw is not present in the products listed or is not exploitable.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for these products may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-11600"
},
{
"category": "external",
"summary": "RHBZ#1474928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-11600",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11600"
}
],
"release_date": "2017-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:49:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:49:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.6.3.rt56.811.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.6.3.rt56.811.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.6.3.rt56.811.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1738
Vulnerability from csaf_redhat - Published: 2018-05-29 21:40 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system might be required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update, mitigation for PowerPC architecture is provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3449601",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1738",
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3449601",
"url": "https://access.redhat.com/articles/3449601"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1738.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:05:06+00:00",
"generator": {
"date": "2025-11-21T18:05:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1738",
"initial_release_date": "2018-05-29T21:40:44+00:00",
"revision_history": [
{
"date": "2018-05-29T21:40:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T21:40:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "perf-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.33.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.33.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "perf-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.33.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.33.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.33.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.33.1.el7.s390x",
"product_id": "perf-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.33.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.33.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.33.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.33.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.33.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.33.1.el7.src",
"product_id": "kernel-0:3.10.0-693.33.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.33.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.33.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T21:40:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.33.1.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.33.1.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.33.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1659
Vulnerability from csaf_redhat - Published: 2018-05-22 01:38 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1659",
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1659.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:57+00:00",
"generator": {
"date": "2025-11-21T18:04:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1659",
"initial_release_date": "2018-05-22T01:38:31+00:00",
"revision_history": [
{
"date": "2018-05-22T01:38:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:38:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.479.el6_7.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.479.el6_7.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.479.el6_7.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.479.el6_7.7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.7?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.7?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.7?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.7?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:38:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.7.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1656
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1656",
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1656.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:56+00:00",
"generator": {
"date": "2025-11-21T18:04:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1656",
"initial_release_date": "2018-05-22T01:37:38+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent-win32@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.355.el6_4.11?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.355.el6_4.11?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.11.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1638
Vulnerability from csaf_redhat - Published: 2018-05-29 15:03 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86 (both 32 and 64 bit) architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1638",
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1638.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1638",
"initial_release_date": "2018-05-29T15:03:12+00:00",
"revision_history": [
{
"date": "2018-05-29T15:03:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T15:03:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "perf-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.55.4.el6.i686",
"product_id": "python-perf-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.55.4.el6.i686",
"product_id": "perf-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.4.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.4.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.55.4.el6.i686",
"product_id": "kernel-0:2.6.32-573.55.4.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.4.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.55.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.55.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.55.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.55.4.el6.src",
"product_id": "kernel-0:2.6.32-573.55.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.55.4.el6.s390x",
"product_id": "perf-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.4.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.4.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.55.4.el6.s390x",
"product_id": "kernel-0:2.6.32-573.55.4.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.4.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "perf-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.55.4.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.55.4.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T15:03:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.55.4.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.55.4.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.55.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1664
Vulnerability from csaf_redhat - Published: 2018-05-22 01:34 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1664",
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1664.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:58+00:00",
"generator": {
"date": "2025-11-21T18:04:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1664",
"initial_release_date": "2018-05-22T01:34:00+00:00",
"revision_history": [
{
"date": "2018-05-22T01:34:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:34:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6_4.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-18.el6_4.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6_4.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6_4.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6_4.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-18.el6_4.17.x86_64",
"product": {
"name": "libvirt-0:0.10.2-18.el6_4.17.x86_64",
"product_id": "libvirt-0:0.10.2-18.el6_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6_4.17?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-18.el6_4.17.src",
"product": {
"name": "libvirt-0:0.10.2-18.el6_4.17.src",
"product_id": "libvirt-0:0.10.2-18.el6_4.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6_4.17?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6_4.17?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"product_id": "libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6_4.17?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-18.el6_4.17.i686",
"product": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.i686",
"product_id": "libvirt-client-0:0.10.2-18.el6_4.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6_4.17?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.17.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.17.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.17.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.17.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:34:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.17.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2161
Vulnerability from csaf_redhat - Published: 2018-07-10 17:36 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* When a Nonvolatile Memory Express (NVMe) namespace was created, changed, or deleted, an occasional deadlock occurred. With this update, namespace scanning and removal does not hold a mutual exclusion (mutex) program object. As a result, a deadlock no longer occurs in the described scenario. (BZ#1566886)\n\n* Previously, a live migration of a virtual machine from one host with updated firmware to another host without updated firmware resulted in incorrect kernel settings for Meltdown mitigations, which could leave the kernel vulnerable to Meltdown. With this fix, the firmware on the new physical host is re-scanned for updates after a live migration. As a result, the kernel uses the correct mitigation in the described scenario. (BZ#1570507)\n\n* Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized. (BZ#1578044)\n\n* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586146)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs.\n\nThe system must be rebooted for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2161",
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2161.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:26+00:00",
"generator": {
"date": "2025-11-21T18:05:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2161",
"initial_release_date": "2018-07-10T17:36:02+00:00",
"revision_history": [
{
"date": "2018-07-10T17:36:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-10T17:36:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.53.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.53.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.53.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.53.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.53.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.53.1.el7.src",
"product_id": "kernel-0:3.10.0-514.53.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.53.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "perf-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.53.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.53.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.53.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-514.53.1.el7.s390x",
"product_id": "perf-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.53.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.53.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.53.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T17:36:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.53.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.53.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.53.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1645
Vulnerability from csaf_redhat - Published: 2018-05-22 01:41 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0 (Mitaka).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1645",
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1645.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:53+00:00",
"generator": {
"date": "2025-11-21T18:04:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1645",
"initial_release_date": "2018-05-22T01:41:01+00:00",
"revision_history": [
{
"date": "2018-05-22T01:41:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:41:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 9.0",
"product": {
"name": "Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"CERT-CC",
"Cyrille Chatras"
],
"organization": "Orange.com"
}
],
"cve": "CVE-2018-7550",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1549798"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur while loading a kernel image during the guest boot, if mh_load_end_addr address is greater than the mh_bss_end_addr address. A user or process could use this flaw to potentially achieve arbitrary code execution on a host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: i386: multiboot OOB access while loading kernel image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "RHBZ#1549798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550"
}
],
"release_date": "2018-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: i386: multiboot OOB access while loading kernel image"
},
{
"acknowledgments": [
{
"names": [
"Ross Lagerwall"
],
"organization": "Citrix.com"
}
],
"cve": "CVE-2018-7858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553402"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: cirrus: OOB access when updating VGA display",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "RHBZ#1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: cirrus: OOB access when updating VGA display"
}
]
}
RHSA-2018:1676
Vulnerability from csaf_redhat - Published: 2018-05-22 02:46 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for org.ovirt.engine-root is now available for Red Hat Virtualization Engine 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The org.ovirt.engine-root is a core component of oVirt.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the org.ovirt.engine-root side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1676",
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1676.json"
}
],
"title": "Red Hat Security Advisory: org.ovirt.engine-root security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:00+00:00",
"generator": {
"date": "2025-11-21T18:05:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1676",
"initial_release_date": "2018-05-22T02:46:57+00:00",
"revision_history": [
{
"date": "2018-05-22T02:46:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T02:46:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHV-M 4.2",
"product": {
"name": "RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-websocket-proxy@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-health-check-bundler@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-websocket-proxy@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhvm-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "rhvm-0:4.2.3.6-0.1.el7.noarch",
"product_id": "rhvm-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-vmconsole-proxy-helper@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-vmconsole-proxy-helper@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-plugin-ovirt-engine-common@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-dbscripts@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-extensions-api-impl-javadoc@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-restapi@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-setup-base@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-tools-backup@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-backend@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-lib@4.2.3.6-0.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"product": {
"name": "ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"product_id": "ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine-webadmin-portal@4.2.3.6-0.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.src",
"product": {
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.src",
"product_id": "ovirt-engine-0:4.2.3.6-0.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovirt-engine@4.2.3.6-0.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-0:4.2.3.6-0.1.el7.src as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.src"
},
"product_reference": "ovirt-engine-0:4.2.3.6-0.1.el7.src",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-0:4.2.3.6-0.1.el7.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:rhvm-0:4.2.3.6-0.1.el7.noarch"
},
"product_reference": "rhvm-0:4.2.3.6-0.1.el7.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.src",
"7Server-RHV-S-4.2:ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:rhvm-0:4.2.3.6-0.1.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T02:46:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.src",
"7Server-RHV-S-4.2:ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:rhvm-0:4.2.3.6-0.1.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-0:4.2.3.6-0.1.el7.src",
"7Server-RHV-S-4.2:ovirt-engine-backend-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-dbscripts-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-extensions-api-impl-javadoc-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-health-check-bundler-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-lib-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-restapi-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-base-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-ovirt-engine-common-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-setup-plugin-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-tools-backup-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-vmconsole-proxy-helper-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-webadmin-portal-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:ovirt-engine-websocket-proxy-0:4.2.3.6-0.1.el7.noarch",
"7Server-RHV-S-4.2:rhvm-0:4.2.3.6-0.1.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1669
Vulnerability from csaf_redhat - Published: 2018-05-22 01:44 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1669",
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1669.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1669",
"initial_release_date": "2018-05-22T01:44:19+00:00",
"revision_history": [
{
"date": "2018-05-22T01:44:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:44:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-62.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-62.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-62.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-62.el6_9.2.i686",
"product": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686",
"product_id": "libvirt-0:0.10.2-62.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-62.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"product": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"product_id": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-62.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-62.el6_9.2.src",
"product": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src",
"product_id": "libvirt-0:0.10.2-62.el6_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-62.el6_9.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"product": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"product_id": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-62.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"product": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"product_id": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-62.el6_9.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"product_id": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-62.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"product": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"product_id": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-62.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"product": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"product_id": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-62.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"product": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"product_id": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-62.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"product": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"product_id": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-62.el6_9.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:44:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Client-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Client-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6ComputeNode-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Server-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Server-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.src",
"6Workstation-optional-6.9.z:libvirt-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-client-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-debuginfo-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-devel-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-lock-sanlock-0:0.10.2-62.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.i686",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.s390x",
"6Workstation-optional-6.9.z:libvirt-python-0:0.10.2-62.el6_9.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1710
Vulnerability from csaf_redhat - Published: 2018-05-23 15:56 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the redhat-virtualization-host side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1710",
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1580328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580328"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1710.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:03+00:00",
"generator": {
"date": "2025-11-21T18:05:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1710",
"initial_release_date": "2018-05-23T15:56:56+00:00",
"revision_history": [
{
"date": "2018-05-23T15:56:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-23T15:56:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H ELS",
"product": {
"name": "RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch",
"product_id": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@3.6-20180521.0.el7_3?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"product": {
"name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"product_id": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@3.6-20180521.0.el7_3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src"
},
"product_reference": "redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
}
],
"cve": "CVE-2018-1087",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566837"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: error in exception handling leads to wrong debug stack value",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1087"
},
{
"category": "external",
"summary": "RHBZ#1566837",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1087"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T15:56:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: KVM: error in exception handling leads to wrong debug stack value"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T15:56:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Andy Lutomirski"
]
},
{
"names": [
"Nick Peterson"
],
"organization": "Everdox Tech LLC"
}
],
"cve": "CVE-2018-8897",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-03-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1567074"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: error in exception handling leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "RHBZ#1567074",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/pop_ss",
"url": "https://access.redhat.com/security/vulnerabilities/pop_ss"
}
],
"release_date": "2018-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T15:56:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-0:3.6-20180521.0.el7_3.src",
"7Server-RHEV-Hypervisor-ELS-7:redhat-virtualization-host-image-update-0:3.6-20180521.0.el7_3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: error in exception handling leads to DoS"
}
]
}
RHSA-2018:1674
Vulnerability from csaf_redhat - Published: 2018-05-22 02:48 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhvm-setup-plugins is now available for Red Hat Virtualization Engine 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhvm-setup-plugins package adds functionality exclusive only to Red Hat Virtualization Manager, and is not available for the upstream ovirt-engine. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.\n\nThe following packages have been upgraded to a later upstream version: rhvm-setup-plugins (4.2.9). (BZ#1579326)\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1674",
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1674.json"
}
],
"title": "Red Hat Security Advisory: rhvm-setup-plugins security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:00+00:00",
"generator": {
"date": "2025-11-21T18:05:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1674",
"initial_release_date": "2018-05-22T02:48:45+00:00",
"revision_history": [
{
"date": "2018-05-22T02:48:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T02:48:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHV-M 4.2",
"product": {
"name": "RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.src",
"product": {
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.src",
"product_id": "rhvm-setup-plugins-0:4.2.9-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.2.9-1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"product": {
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"product_id": "rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.2.9-1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch"
},
"product_reference": "rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.2.9-1.el7ev.src as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.src"
},
"product_reference": "rhvm-setup-plugins-0:4.2.9-1.el7ev.src",
"relates_to_product_reference": "7Server-RHV-S-4.2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T02:48:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.9-1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2171
Vulnerability from csaf_redhat - Published: 2018-07-11 15:39 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2171",
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2171.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:31+00:00",
"generator": {
"date": "2025-11-21T18:05:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2171",
"initial_release_date": "2018-07-11T15:39:44+00:00",
"revision_history": [
{
"date": "2018-07-11T15:39:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-11T15:39:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.40.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.40.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.40.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.40.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.40.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-348.40.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-348.40.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.40.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.40.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-348.40.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-348.40.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.40.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.40.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-348.40.1.el5.src",
"product_id": "kernel-0:2.6.18-348.40.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.40.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.40.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-348.40.1.el5.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-348.40.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.40.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.40.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-348.40.1.el5.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-11T15:39:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.40.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.40.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.40.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1967
Vulnerability from csaf_redhat - Published: 2018-06-26 15:42 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\n* This release also includes next iteration of the CVE-2017-5715 mitigation that includes the SMCCC (Secure Monitor Call Calling Convention) 1.1 support. (CVE-2017-5715, ARM)\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\nThese updated kernel-alt packages include numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article: https://access.redhat.com/articles/3485851",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1967",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-3639",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-5715",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3485851",
"url": "https://access.redhat.com/articles/3485851"
},
{
"category": "external",
"summary": "1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1967.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:15+00:00",
"generator": {
"date": "2025-11-21T18:05:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1967",
"initial_release_date": "2018-06-26T15:42:16+00:00",
"revision_history": [
{
"date": "2018-06-26T15:42:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T15:42:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-49.8.1.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-49.8.1.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.8.1.el7a?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_id": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.8.1.el7a?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_id": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-49.8.1.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-49.8.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-49.8.1.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"relates_to_product_reference": "7Server-optional-RHELALT"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Google Project Zero"
]
}
],
"cve": "CVE-2017-5715",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-11-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1519780"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative execution branch target injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "RHBZ#1519780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
},
{
"category": "external",
"summary": "RHSB-speculativeexecution",
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715"
},
{
"category": "external",
"summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"category": "external",
"summary": "https://meltdownattack.com",
"url": "https://meltdownattack.com"
},
{
"category": "external",
"summary": "https://spectreattack.com/",
"url": "https://spectreattack.com/"
}
],
"release_date": "2018-01-03T22:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative execution branch target injection"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T15:42:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.8.1.el7a.src",
"7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.8.1.el7a.noarch",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-0:4.14.0-49.8.1.el7a.s390x",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.aarch64",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.ppc64le",
"7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.8.1.el7a.s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1690
Vulnerability from csaf_redhat - Published: 2018-05-22 08:52 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vdsm is now available for RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host\u0027s storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the VDSM side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1690",
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1690.json"
}
],
"title": "Red Hat Security Advisory: vdsm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1690",
"initial_release_date": "2018-05-22T08:52:52+00:00",
"revision_history": [
{
"date": "2018-05-22T08:52:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T08:52:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product": {
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-macspoof@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-infra-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-infra-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-infra-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-infra@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-python-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-python-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-cli-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-cli-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-cli-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-cli@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-xmlrpc@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-debug-plugin@4.17.45-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.17.45-1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-0:4.17.45-1.el7ev.src",
"product": {
"name": "vdsm-0:4.17.45-1.el7ev.src",
"product_id": "vdsm-0:4.17.45-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.17.45-1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.17.45-1.el7ev.src as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.src"
},
"product_reference": "vdsm-0:4.17.45-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-cli-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-cli-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-cli-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-infra-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-infra-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-infra-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-python-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-python-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.src",
"7Server-RHEV-Agents-ELS-7:vdsm-cli-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-infra-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-python-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T08:52:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.src",
"7Server-RHEV-Agents-ELS-7:vdsm-cli-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-infra-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-python-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-0:4.17.45-1.el7ev.src",
"7Server-RHEV-Agents-ELS-7:vdsm-cli-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-debug-plugin-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-ethtool-options-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-fcoe-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-macspoof-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-openstacknet-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vhostmd-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-hook-vmfex-dev-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-infra-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-jsonrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-python-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-xmlrpc-0:4.17.45-1.el7ev.noarch",
"7Server-RHEV-Agents-ELS-7:vdsm-yajsonrpc-0:4.17.45-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1644
Vulnerability from csaf_redhat - Published: 2018-05-22 01:47 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1644",
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1644.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:53+00:00",
"generator": {
"date": "2025-11-21T18:04:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1644",
"initial_release_date": "2018-05-22T01:47:24+00:00",
"revision_history": [
{
"date": "2018-05-22T01:47:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:47:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 10.0",
"product": {
"name": "Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:10::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:47:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"CERT-CC",
"Cyrille Chatras"
],
"organization": "Orange.com"
}
],
"cve": "CVE-2018-7550",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1549798"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur while loading a kernel image during the guest boot, if mh_load_end_addr address is greater than the mh_bss_end_addr address. A user or process could use this flaw to potentially achieve arbitrary code execution on a host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: i386: multiboot OOB access while loading kernel image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "RHBZ#1549798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550"
}
],
"release_date": "2018-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:47:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: i386: multiboot OOB access while loading kernel image"
},
{
"acknowledgments": [
{
"names": [
"Ross Lagerwall"
],
"organization": "Citrix.com"
}
],
"cve": "CVE-2018-7858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553402"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: cirrus: OOB access when updating VGA display",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "RHBZ#1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:47:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: cirrus: OOB access when updating VGA display"
}
]
}
RHSA-2018:1658
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1658",
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1658.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:00+00:00",
"generator": {
"date": "2025-11-21T18:05:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1658",
"initial_release_date": "2018-05-22T01:37:46+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.6?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.6?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.6.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2216
Vulnerability from csaf_redhat - Published: 2018-07-17 14:58 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586145)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2216",
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2216.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:33+00:00",
"generator": {
"date": "2025-11-21T18:05:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2216",
"initial_release_date": "2018-07-17T14:58:01+00:00",
"revision_history": [
{
"date": "2018-07-17T14:58:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-17T14:58:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "perf-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.71.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.71.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.71.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.71.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.71.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.71.1.el7.src",
"product_id": "kernel-0:3.10.0-327.71.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.71.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.71.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-17T14:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.71.1.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.71.1.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.71.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2162
Vulnerability from csaf_redhat - Published: 2018-07-10 17:58 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\n* QEMU: cirrus: OOB access when updating VGA display (CVE-2018-7858)\n\n* QEMU: vga: OOB read access during display update (CVE-2017-13672)\n\n* Qemu: Out-of-bounds read in vga_draw_text routine (CVE-2018-5683)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Ross Lagerwall (Citrix.com) for reporting CVE-2018-7858; David Buchanan for reporting CVE-2017-13672; and Jiang Xin and Lin ZheCheng for reporting CVE-2018-5683.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2162",
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1486560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560"
},
{
"category": "external",
"summary": "1530356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356"
},
{
"category": "external",
"summary": "1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2162.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:27+00:00",
"generator": {
"date": "2025-11-21T18:05:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2162",
"initial_release_date": "2018-07-10T17:58:52+00:00",
"revision_history": [
{
"date": "2018-07-10T17:58:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-10T17:58:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.506.el6_10.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.506.el6_10.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.506.el6_10.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.506.el6_10.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.506.el6_10.1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.506.el6_10.1?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.506.el6_10.1?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.506.el6_10.1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.506.el6_10.1?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.506.el6_10.1?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"David Buchanan"
]
}
],
"cve": "CVE-2017-13672",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-08-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1486560"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read access issue was found in the VGA display emulator built into the Quick emulator (QEMU). It could occur while reading VGA memory to update graphics display. A privileged user/process inside guest could use this flaw to crash the QEMU process on the host resulting in denial of service situation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: vga: OOB read access during display update",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13672"
},
{
"category": "external",
"summary": "RHBZ#1486560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13672"
}
],
"release_date": "2017-08-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T17:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.0,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "QEMU: vga: OOB read access during display update"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T17:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Jiang Xin",
"Lin ZheCheng"
]
}
],
"cve": "CVE-2018-5683",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2017-12-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1530356"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read access issue was found in the VGA emulator of QEMU. It could occur in vga_draw_text routine, while updating display area for a vnc client. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Qemu: Out-of-bounds read in vga_draw_text routine",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5683"
},
{
"category": "external",
"summary": "RHBZ#1530356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5683",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5683"
}
],
"release_date": "2017-12-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T17:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.0,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Qemu: Out-of-bounds read in vga_draw_text routine"
},
{
"acknowledgments": [
{
"names": [
"Ross Lagerwall"
],
"organization": "Citrix.com"
}
],
"cve": "CVE-2018-7858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553402"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: cirrus: OOB access when updating VGA display",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "RHBZ#1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T17:58:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Client-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Client-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Client-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6ComputeNode-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6ComputeNode-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6ComputeNode-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Server-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Server-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Server-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-guest-agent-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-img-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.src",
"6Workstation-6.10.z:qemu-kvm-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.i686",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.ppc64",
"6Workstation-6.10.z:qemu-kvm-debuginfo-2:0.12.1.2-2.506.el6_10.1.x86_64",
"6Workstation-6.10.z:qemu-kvm-tools-2:0.12.1.2-2.506.el6_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: cirrus: OOB access when updating VGA display"
}
]
}
RHSA-2018:1657
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1657",
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1657.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:56+00:00",
"generator": {
"date": "2025-11-21T18:04:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1657",
"initial_release_date": "2018-05-22T01:37:44+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.415.el6_5.18?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.415.el6_5.18?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.415.el6_5.18?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.415.el6_5.18?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.415.el6_5.18?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.415.el6_5.18?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.18.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.18.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1655
Vulnerability from csaf_redhat - Published: 2018-05-21 21:39 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1655",
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1655.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:56+00:00",
"generator": {
"date": "2025-11-21T18:04:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1655",
"initial_release_date": "2018-05-21T21:39:24+00:00",
"revision_history": [
{
"date": "2018-05-21T21:39:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T21:39:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T21:39:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2364
Vulnerability from csaf_redhat - Published: 2018-08-07 14:21 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform\n8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products.\n\nSecurity fix(es):\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nAcknowledgements:\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center)\nand Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2364",
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2364.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:42+00:00",
"generator": {
"date": "2025-11-21T18:05:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2364",
"initial_release_date": "2018-08-07T14:21:38+00:00",
"revision_history": [
{
"date": "2018-08-07T14:21:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-07T14:21:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"product": {
"name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:8::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-07T14:21:38+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1661
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1661",
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1661.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:57+00:00",
"generator": {
"date": "2025-11-21T18:04:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1661",
"initial_release_date": "2018-05-22T01:37:30+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-tools@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-105.el7_2.17?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"product": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"product_id": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.17?arch=i686\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.17?arch=i686\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-10:1.5.3-105.el7_2.17.i686",
"product": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686",
"product_id": "libcacard-10:1.5.3-105.el7_2.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.17?arch=i686\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"product": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"product_id": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.17?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.17.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2363
Vulnerability from csaf_redhat - Published: 2018-08-07 14:35 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform\n9.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products.\n\nSecurity fix(es):\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nAcknowledgements:\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center)\nand Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2363",
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2363.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:42+00:00",
"generator": {
"date": "2025-11-21T18:05:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2363",
"initial_release_date": "2018-08-07T14:35:07+00:00",
"revision_history": [
{
"date": "2018-08-07T14:35:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-07T14:35:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 9.0",
"product": {
"name": "Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-07T14:35:07+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-9.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1637
Vulnerability from csaf_redhat - Published: 2018-05-29 16:34 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1637",
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1637.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1637",
"initial_release_date": "2018-05-29T16:34:53+00:00",
"revision_history": [
{
"date": "2018-05-29T16:34:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T16:34:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "perf-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.66.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.66.5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.66.5.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.66.5.el7.src",
"product_id": "kernel-0:3.10.0-327.66.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.66.5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.66.5.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.66.5.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.66.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T16:34:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.66.5.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.66.5.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.66.5.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2387
Vulnerability from csaf_redhat - Published: 2018-08-14 20:53 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* Previously, configurations with the little-endian variant of IBM Power Systems CPU architectures and Hard Disk Drives (HDD) designed according to Nonvolatile Memory Express (NVMe) open standards, experienced crashes during shutdown or reboot due to race conditions of CPUs. As a consequence, the sysfs pseudo file system threw a stack trace report about an attempt to create a duplicate entry in sysfs. This update modifies the source code so that the irq_dispose_mapping() function is called first and the msi_bitmap_free_hwirqs() function is called afterwards. As a result, the race condition no longer appears in the described scenario. (BZ#1570510)\n\n* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586147)\n\n* During a balloon reset, page pointers were not correctly initialized after unmapping the memory. Consequently, on the VMware ESXi hypervisor with \"Fault Tolerance\" and \"ballooning\" enabled, the following messages repeatedly occurred in the kernel log:\n\n[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100()\n[3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)\n\nWith this update, the underlying source code has been fixed to initialize page pointers properly. As a result, the mm/vmalloc.c warnings no longer occur under the described circumstances. (BZ#1595600)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2387",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2387.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:43+00:00",
"generator": {
"date": "2025-11-21T18:05:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2387",
"initial_release_date": "2018-08-14T20:53:50+00:00",
"revision_history": [
{
"date": "2018-08-14T20:53:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-14T20:53:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "perf-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.37.4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "perf-0:3.10.0-693.37.4.el7.s390x",
"product_id": "perf-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"product_id": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.37.4.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.37.4.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.37.4.el7.src",
"product_id": "kernel-0:3.10.0-693.37.4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "perf-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.37.4.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.37.4.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.37.4.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.37.4.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3620",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3620"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:53:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:53:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3646",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:53:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7ComputeNode-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7ComputeNode-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.src",
"7Server-optional-7.4.EUS:kernel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-abi-whitelists-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-bootwrapper-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debug-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-s390x-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-doc-0:3.10.0-693.37.4.el7.noarch",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-headers-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-kdump-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-kdump-devel-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:kernel-tools-libs-devel-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-0:3.10.0-693.37.4.el7.x86_64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.ppc64le",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.s390x",
"7Server-optional-7.4.EUS:python-perf-debuginfo-0:3.10.0-693.37.4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
}
]
}
RHSA-2018:2309
Vulnerability from csaf_redhat - Published: 2018-07-31 17:59 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2309",
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2309.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:40+00:00",
"generator": {
"date": "2025-11-21T18:05:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2309",
"initial_release_date": "2018-07-31T17:59:36+00:00",
"revision_history": [
{
"date": "2018-07-31T17:59:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-31T17:59:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "perf-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.72.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.72.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.72.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.72.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.72.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.72.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.72.1.el6.src",
"product_id": "kernel-0:2.6.32-504.72.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.72.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-31T17:59:36+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.72.1.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.72.1.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.72.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1696
Vulnerability from csaf_redhat - Published: 2018-05-23 08:29 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the redhat-virtualization-host side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1696",
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1696.json"
}
],
"title": "Red Hat Security Advisory: redhat-virtualization-host security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:02+00:00",
"generator": {
"date": "2025-11-21T18:05:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1696",
"initial_release_date": "2018-05-23T08:29:16+00:00",
"revision_history": [
{
"date": "2018-05-23T08:29:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-23T08:29:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"product_id": "redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180518.2.el7_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180518.2.el7_5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20180518.2.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180518.2.el7_5.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-23T08:29:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180518.2.el7_5.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180518.2.el7_5.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1641
Vulnerability from csaf_redhat - Published: 2018-05-29 16:31 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1641",
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1641.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:52+00:00",
"generator": {
"date": "2025-11-21T18:04:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1641",
"initial_release_date": "2018-05-29T16:31:00+00:00",
"revision_history": [
{
"date": "2018-05-29T16:31:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T16:31:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.88.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.88.4.el6.src",
"product_id": "kernel-0:2.6.32-358.88.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.88.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "perf-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.88.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.88.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.88.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.88.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.88.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.88.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.88.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.88.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.88.4.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.88.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.88.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.88.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.88.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T16:31:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.88.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.88.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.88.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1643
Vulnerability from csaf_redhat - Published: 2018-05-22 01:41 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 12.0 (Pike).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1643",
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1643.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:53+00:00",
"generator": {
"date": "2025-11-21T18:04:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1643",
"initial_release_date": "2018-05-22T01:41:08+00:00",
"revision_history": [
{
"date": "2018-05-22T01:41:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:41:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 12.0",
"product": {
"name": "Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:12::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"CERT-CC",
"Cyrille Chatras"
],
"organization": "Orange.com"
}
],
"cve": "CVE-2018-7550",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1549798"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur while loading a kernel image during the guest boot, if mh_load_end_addr address is greater than the mh_bss_end_addr address. A user or process could use this flaw to potentially achieve arbitrary code execution on a host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: i386: multiboot OOB access while loading kernel image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "RHBZ#1549798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550"
}
],
"release_date": "2018-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: i386: multiboot OOB access while loading kernel image"
},
{
"acknowledgments": [
{
"names": [
"Ross Lagerwall"
],
"organization": "Citrix.com"
}
],
"cve": "CVE-2018-7858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553402"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: cirrus: OOB access when updating VGA display",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "RHBZ#1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:41:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.ppc64le",
"7Server-RH7-RHOS-12.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: cirrus: OOB access when updating VGA display"
}
]
}
RHSA-2018:1633
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1633",
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1633.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:50+00:00",
"generator": {
"date": "2025-11-21T18:04:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1633",
"initial_release_date": "2018-05-22T01:37:21+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-156.el7_5.2?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"product_id": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-156.el7_5.2?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-156.el7_5.2?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-156.el7_5.2?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"product_id": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-156.el7_5.2?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"product": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"product_id": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-156.el7_5.2?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.2.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1642
Vulnerability from csaf_redhat - Published: 2018-05-22 00:16 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1642",
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1642.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:52+00:00",
"generator": {
"date": "2025-11-21T18:04:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1642",
"initial_release_date": "2018-05-22T00:16:17+00:00",
"revision_history": [
{
"date": "2018-05-22T00:16:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T00:16:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.25.7.rt56.615.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.25.7.rt56.615.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.25.7.rt56.615.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.25.7.rt56.615.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T00:16:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.25.7.rt56.615.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.25.7.rt56.615.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3401
Vulnerability from csaf_redhat - Published: 2018-10-30 18:07 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3401",
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3401.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:40+00:00",
"generator": {
"date": "2025-11-21T18:06:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3401",
"initial_release_date": "2018-10-30T18:07:06+00:00",
"revision_history": [
{
"date": "2018-10-30T18:07:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T18:07:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent-win32@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.355.el6_4.12?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.355.el6_4.12?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T18:07:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-guest-agent-win32-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-img-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.src",
"6Server-optional-6.4.AUS:qemu-kvm-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.355.el6_4.12.x86_64",
"6Server-optional-6.4.AUS:qemu-kvm-tools-2:0.12.1.2-2.355.el6_4.12.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3399
Vulnerability from csaf_redhat - Published: 2018-10-30 14:09 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3399",
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3399.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:39+00:00",
"generator": {
"date": "2025-11-21T18:06:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3399",
"initial_release_date": "2018-10-30T14:09:20+00:00",
"revision_history": [
{
"date": "2018-10-30T14:09:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T14:09:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-18.el6_4.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6_4.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6_4.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6_4.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-18.el6_4.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"product_id": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6_4.18?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-18.el6_4.18.src",
"product": {
"name": "libvirt-0:0.10.2-18.el6_4.18.src",
"product_id": "libvirt-0:0.10.2-18.el6_4.18.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-18.el6_4.18?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-18.el6_4.18.i686",
"product": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.i686",
"product_id": "libvirt-client-0:0.10.2-18.el6_4.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-18.el6_4.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"product_id": "libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-18.el6_4.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-18.el6_4.18?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.18.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.18.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.18.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.18.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T14:09:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.src",
"6Server-optional-6.4.AUS:libvirt-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-client-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-debuginfo-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.i686",
"6Server-optional-6.4.AUS:libvirt-devel-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-lock-sanlock-0:0.10.2-18.el6_4.18.x86_64",
"6Server-optional-6.4.AUS:libvirt-python-0:0.10.2-18.el6_4.18.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2164
Vulnerability from csaf_redhat - Published: 2018-07-10 18:00 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\n* kernel: Use-after-free vulnerability in mm/mempolicy.c:do_get_mempolicy function allows local denial of service or other unspecified impact (CVE-2018-10675)\n\n* Kernel: FPU state information leakage via lazy FPU restore (CVE-2018-3665)\n\n* kernel: error in exception handling leads to DoS (CVE-2018-8897 regression) (CVE-2018-10872)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639 and Julian Stecklina (Amazon.de), Thomas Prescher (cyberus-technology.de), and Zdenek Sojka (sysgo.com) for reporting CVE-2018-3665.\n\nBug Fix(es):\n\n* Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized. (BZ#1574592)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2164",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1575065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065"
},
{
"category": "external",
"summary": "1585011",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585011"
},
{
"category": "external",
"summary": "1596094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596094"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2164.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:27+00:00",
"generator": {
"date": "2025-11-21T18:05:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2164",
"initial_release_date": "2018-07-10T18:00:07+00:00",
"revision_history": [
{
"date": "2018-07-10T18:00:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-10T18:00:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.2.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.2.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.2.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "perf-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.2.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.2.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.2.1.el6.i686",
"product_id": "perf-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.2.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.2.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686",
"product_id": "python-perf-0:2.6.32-754.2.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.2.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.2.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.2.1.el6.src",
"product_id": "kernel-0:2.6.32-754.2.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.2.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x",
"product_id": "perf-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.2.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.2.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "perf-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.2.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.2.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T18:00:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Julian Stecklina"
],
"organization": "Amazon.de"
},
{
"names": [
"Thomas Prescher"
],
"organization": "cyberus-technology.de"
},
{
"names": [
"Zdenek Sojka"
],
"organization": "sysgo.com"
}
],
"cve": "CVE-2018-3665",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585011"
}
],
"notes": [
{
"category": "description",
"text": "A Floating Point Unit (FPU) state information leakage flaw was found in the way the Linux kernel saved and restored the FPU state during task switch. Linux kernels that follow the \"Lazy FPU Restore\" scheme are vulnerable to the FPU state information leakage issue. An unprivileged local attacker could use this flaw to read FPU state bits by conducting targeted cache side-channel attacks, similar to the Meltdown vulnerability disclosed earlier this year.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: FPU state information leakage via lazy FPU restore",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and Red Hat Enterprise MRG 2 may address this issue.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and\nmaintenance life cycle. This has been rated as having Moderate security\nimpact and is not currently planned to be addressed in future updates. For\nadditional information, refer to the Red Hat Enterprise Linux Life\nCycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "RHBZ#1585011",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585011"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3665"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2018/06/15/5",
"url": "http://www.openwall.com/lists/oss-security/2018/06/15/5"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/3485131",
"url": "https://access.redhat.com/solutions/3485131"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"
}
],
"release_date": "2018-06-13T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T18:00:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"category": "workaround",
"details": "RHEL-7 will automatically default to (safe) \u201ceager\u201d floating point register restore on Sandy Bridge and newer Intel processors. AMD processors are not affected. You can mitigate this issue on older processors by booting the kernel with the \u0027eagerfpu=on\u0027 parameter to enable eager FPU restore mode. In this mode FPU state is saved and restored for every task/context switch regardless of whether the current process invokes FPU instructions or not. The parameter does not affect performance negatively, and can be applied with no adverse effects to processors that are not affected.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: FPU state information leakage via lazy FPU restore"
},
{
"cve": "CVE-2018-10675",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1575065"
}
],
"notes": [
{
"category": "description",
"text": "The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "RHBZ#1575065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575065"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10675"
}
],
"release_date": "2017-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T18:00:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact"
},
{
"cve": "CVE-2018-10872",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596094"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel; no other versions are affected by this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: error in exception handling leads to DoS (CVE-2018-8897 regression)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10872"
},
{
"category": "external",
"summary": "RHBZ#1596094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596094"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10872"
}
],
"release_date": "2018-07-10T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-10T18:00:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.2.1.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.2.1.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.2.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: error in exception handling leads to DoS (CVE-2018-8897 regression)"
}
]
}
RHSA-2018:1636
Vulnerability from csaf_redhat - Published: 2018-05-22 16:59 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1636",
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1636.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1636",
"initial_release_date": "2018-05-22T16:59:29+00:00",
"revision_history": [
{
"date": "2018-05-22T16:59:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T16:59:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "perf-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.5.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.48.5.el7.src",
"product_id": "kernel-0:3.10.0-514.48.5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.48.5.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.48.5.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.5.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "perf-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.5.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"product_id": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.5.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "perf-0:3.10.0-514.48.5.el7.s390x",
"product_id": "perf-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.48.5.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"product_id": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.48.5.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.48.5.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T16:59:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.48.5.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.48.5.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.48.5.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2006
Vulnerability from csaf_redhat - Published: 2018-06-26 16:28 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD CPUs.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* The \"virsh capabilities\" command previously displayed an inaccurate number of 4 KiB memory pages on systems with very large amounts of memory. This update optimizes the memory diagnostic mechanism to ensure memory page numbers are displayed correctly on such systems. (BZ#1582416)\n\n* After starting a large amount of guest virtual machines in a single session, the libvirtd service in some cases became unable to start any other guests until it was restarted. This update ensures that libvirtd properly frees memory used for D-Bus replies, which prevents the described problem from occurring. (BZ#1588390)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2006",
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1582416",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582416"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2006.json"
}
],
"title": "Red Hat Security Advisory: libvirt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:18+00:00",
"generator": {
"date": "2025-11-21T18:05:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2006",
"initial_release_date": "2018-06-26T16:28:34+00:00",
"revision_history": [
{
"date": "2018-06-26T16:28:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T16:28:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-gluster@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-rbd@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.11?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.11?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.11.src",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.11.src",
"product_id": "libvirt-0:3.2.0-14.el7_4.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.11?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:28:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.11.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3400
Vulnerability from csaf_redhat - Published: 2018-10-30 14:12 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3400",
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3400.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:39+00:00",
"generator": {
"date": "2025-11-21T18:06:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3400",
"initial_release_date": "2018-10-30T14:12:44+00:00",
"revision_history": [
{
"date": "2018-10-30T14:12:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T14:12:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-46.el6_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-46.el6_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-46.el6_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-46.el6_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-46.el6_6.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"product": {
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"product_id": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-46.el6_6.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"product_id": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-46.el6_6.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-46.el6_6.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"product": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"product_id": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-46.el6_6.9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-46.el6_6.9.src",
"product": {
"name": "libvirt-0:0.10.2-46.el6_6.9.src",
"product_id": "libvirt-0:0.10.2-46.el6_6.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-46.el6_6.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T14:12:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.9.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1650
Vulnerability from csaf_redhat - Published: 2018-05-21 23:20 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1650",
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1650.json"
}
],
"title": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:54+00:00",
"generator": {
"date": "2025-11-21T18:04:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1650",
"initial_release_date": "2018-05-21T23:20:20+00:00",
"revision_history": [
{
"date": "2018-05-21T23:20:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T23:20:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el6_9?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debug@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-debug@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debug@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debug@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debug@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"product": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"product_id": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.171-8.b10.el6_9?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"product": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"product_id": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.171-8.b10.el6_9?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-debug@1.8.0.171-8.b10.el6_9?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"product": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.171-8.b10.el6_9?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch"
},
"product_reference": "java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
},
"product_reference": "java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T23:20:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Client-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Client-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Server-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Server-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.src",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-debuginfo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-demo-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-devel-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-headless-debug-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-javadoc-debug-1:1.8.0.171-8.b10.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-1:1.8.0.171-8.b10.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.8.0-openjdk-src-debug-1:1.8.0.171-8.b10.el6_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2394
Vulnerability from csaf_redhat - Published: 2018-08-14 20:18 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2394",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "1601849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2394.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:47+00:00",
"generator": {
"date": "2025-11-21T18:05:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2394",
"initial_release_date": "2018-08-14T20:18:50+00:00",
"revision_history": [
{
"date": "2018-08-14T20:18:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-14T20:18:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.91.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.91.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.91.4.el6.x86_64",
"product_id": "perf-0:2.6.32-358.91.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.91.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.91.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.91.4.el6.src",
"product_id": "kernel-0:2.6.32-358.91.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.91.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.91.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.91.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.91.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.91.4.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.91.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.91.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3620",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3620"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3646",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
},
{
"acknowledgments": [
{
"names": [
"Vegard Nossum"
],
"organization": "Oracle Corporation"
}
],
"cve": "CVE-2018-10901",
"cwe": {
"id": "CWE-665",
"name": "Improper Initialization"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1601849"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Linux kernel\u0027s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host\u0027s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kvm: vmx: host GDT limit corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10901"
},
{
"category": "external",
"summary": "RHBZ#1601849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601849"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10901"
}
],
"release_date": "2010-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:18:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.91.4.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.91.4.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.91.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: kvm: vmx: host GDT limit corruption"
}
]
}
RHSA-2018:1648
Vulnerability from csaf_redhat - Published: 2018-05-22 01:39 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1648",
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1648.json"
}
],
"title": "Red Hat Security Advisory: java-1.7.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:54+00:00",
"generator": {
"date": "2025-11-21T18:04:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1648",
"initial_release_date": "2018-05-22T01:39:47+00:00",
"revision_history": [
{
"date": "2018-05-22T01:39:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:39:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-headless@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_id": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-accessibility@1.7.0.181-2.6.14.8.el7_5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"product": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.181-2.6.14.8.el7_5?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-headless@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_id": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-accessibility@1.7.0.181-2.6.14.8.el7_5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-headless@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_id": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-accessibility@1.7.0.181-2.6.14.8.el7_5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-headless@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_id": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-accessibility@1.7.0.181-2.6.14.8.el7_5?arch=ppc64le\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-headless@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_id": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-accessibility@1.7.0.181-2.6.14.8.el7_5?arch=aarch64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:39:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Client-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7ComputeNode-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Server-optional-Alt-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.src",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-accessibility-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-headless-1:1.7.0.181-2.6.14.8.el7_5.x86_64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el7_5.noarch",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.aarch64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.ppc64le",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.s390x",
"7Workstation-optional-7.5.Z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el7_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1654
Vulnerability from csaf_redhat - Published: 2018-05-22 01:40 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 7 Extended Life Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1654",
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1654.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:55+00:00",
"generator": {
"date": "2025-11-21T18:04:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1654",
"initial_release_date": "2018-05-22T01:40:02+00:00",
"revision_history": [
{
"date": "2018-05-22T01:40:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:40:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product": {
"name": "RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_id": "qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.6.0-28.el7_3.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.6.0-28.el7_3.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.6.0-28.el7_3.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.6.0-28.el7_3.17?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"product": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"product_id": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.6.0-28.el7_3.17?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64 as a component of RHEV-H and VDSM for 7 Hosts ELS",
"product_id": "7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64",
"relates_to_product_reference": "7Server-RHEV-Agents-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:40:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-Agents-ELS-7:qemu-img-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-common-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.src",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-rhev-debuginfo-10:2.6.0-28.el7_3.17.x86_64",
"7Server-RHEV-Agents-ELS-7:qemu-kvm-tools-rhev-10:2.6.0-28.el7_3.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1675
Vulnerability from csaf_redhat - Published: 2018-05-22 01:45 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vdsm is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host\u0027s storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the VDSM side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1675",
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1675.json"
}
],
"title": "Red Hat Security Advisory: vdsm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:00+00:00",
"generator": {
"date": "2025-11-21T18:05:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1675",
"initial_release_date": "2018-05-22T01:45:00+00:00",
"revision_history": [
{
"date": "2018-05-22T01:45:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:45:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-client@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-cpuflags@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-http@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-api@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-fcoe@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vfio-mdev@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vhostmd@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-nestedvt@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-macspoof@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-localdisk@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-common@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.20.27.2-1.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"product": {
"name": "vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"product_id": "vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-vmfex-dev@4.20.27.2-1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"product": {
"name": "vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"product_id": "vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.20.27.2-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.20.27.2-1.el7ev.x86_64",
"product": {
"name": "vdsm-0:4.20.27.2-1.el7ev.x86_64",
"product_id": "vdsm-0:4.20.27.2-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.20.27.2-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.20.27.2-1.el7ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"product": {
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"product_id": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.20.27.2-1.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"product": {
"name": "vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"product_id": "vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-network@4.20.27.2-1.el7ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"product": {
"name": "vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"product_id": "vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.20.27.2-1.el7ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"product": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"product_id": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-extra-ipv4-addrs@4.20.27.2-1.el7ev?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"product": {
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"product_id": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-checkips@4.20.27.2-1.el7ev?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vdsm-0:4.20.27.2-1.el7ev.src",
"product": {
"name": "vdsm-0:4.20.27.2-1.el7ev.src",
"product_id": "vdsm-0:4.20.27.2-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.20.27.2-1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.20.27.2-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.ppc64le"
},
"product_reference": "vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.20.27.2-1.el7ev.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.src"
},
"product_reference": "vdsm-0:4.20.27.2-1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.20.27.2-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.x86_64"
},
"product_reference": "vdsm-0:4.20.27.2-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-api-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-api-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-client-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-client-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-common-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-common-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le"
},
"product_reference": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64"
},
"product_reference": "vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64"
},
"product_reference": "vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-http-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-http-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.20.27.2-1.el7ev.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.ppc64le"
},
"product_reference": "vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-network-0:4.20.27.2-1.el7ev.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.x86_64"
},
"product_reference": "vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-python-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.src",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:45:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.src",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.src",
"7Server-RHEV-4-Agents-7:vdsm-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-api-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-client-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-common-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-checkips-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-cpuflags-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-ethtool-options-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-hook-extra-ipv4-addrs-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-hook-fcoe-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-localdisk-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-macspoof-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-nestedvt-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-openstacknet-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vfio-mdev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vhostmd-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-hook-vmfex-dev-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-http-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-jsonrpc-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.ppc64le",
"7Server-RHEV-4-Agents-7:vdsm-network-0:4.20.27.2-1.el7ev.x86_64",
"7Server-RHEV-4-Agents-7:vdsm-python-0:4.20.27.2-1.el7ev.noarch",
"7Server-RHEV-4-Agents-7:vdsm-yajsonrpc-0:4.20.27.2-1.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2250
Vulnerability from csaf_redhat - Published: 2018-07-24 18:55 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* If the cifs_reopen_file() function failed to find a file, the pointer to the cifsFileInfo structure was not reinitialized by being set to \"NULL\". Subsequently, the find_writable_file() function used an invalid pointer to cifsFileInfo. Consequently, the operating system terminated unexpectedly. With this update, the underlying source code has been fixed to reinitialize the pointer to cifsFileInfo as expected. As a result, the operating system no longer crashes due to this bug. (BZ#1577086)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2250",
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2250.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:35+00:00",
"generator": {
"date": "2025-11-21T18:05:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2250",
"initial_release_date": "2018-07-24T18:55:52+00:00",
"revision_history": [
{
"date": "2018-07-24T18:55:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-24T18:55:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "perf-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.60.1.el6.i686",
"product_id": "python-perf-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.60.1.el6.i686",
"product_id": "perf-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.60.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.60.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.60.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.60.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.60.1.el6.src",
"product_id": "kernel-0:2.6.32-573.60.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.60.1.el6.s390x",
"product_id": "perf-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.60.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "perf-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.60.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.60.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T18:55:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.60.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.60.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.60.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1630
Vulnerability from csaf_redhat - Published: 2018-05-21 23:04 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1630",
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1630.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:50+00:00",
"generator": {
"date": "2025-11-21T18:04:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1630",
"initial_release_date": "2018-05-21T23:04:38+00:00",
"revision_history": [
{
"date": "2018-05-21T23:04:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T23:04:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-862.3.2.rt56.808.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"product_id": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-862.3.2.rt56.808.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-862.3.2.rt56.808.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T23:04:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-NFV-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-NFV-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-NFV-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.src",
"7Server-RT-7.5.Z:kernel-rt-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-doc-0:3.10.0-862.3.2.rt56.808.el7.noarch",
"7Server-RT-7.5.Z:kernel-rt-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-devel-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-0:3.10.0-862.3.2.rt56.808.el7.x86_64",
"7Server-RT-7.5.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-862.3.2.rt56.808.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1826
Vulnerability from csaf_redhat - Published: 2018-06-12 13:54 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es) and Enhancement(s):\n\nThese updated kernel packages include also numerous bug fixes and enhancements. Space precludes documenting all of the bug fixes and enhancements in this advisory. See the descriptions in the related Knowledge Article:\nhttps://access.redhat.com/articles/3483021",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1826",
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3483021",
"url": "https://access.redhat.com/articles/3483021"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1826.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:05:09+00:00",
"generator": {
"date": "2025-11-21T18:05:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1826",
"initial_release_date": "2018-06-12T13:54:05+00:00",
"revision_history": [
{
"date": "2018-06-12T13:54:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-12T13:54:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "perf-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.59.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.59.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.59.1.el6.i686",
"product_id": "python-perf-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.59.1.el6.i686",
"product_id": "perf-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.59.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.59.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.59.1.el6.i686",
"product_id": "kernel-0:2.6.32-573.59.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.59.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.59.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.59.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.59.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.59.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.59.1.el6.src",
"product_id": "kernel-0:2.6.32-573.59.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.59.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.59.1.el6.s390x",
"product_id": "perf-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.59.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.59.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "perf-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.59.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.59.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-12T13:54:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.59.1.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.59.1.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.59.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1647
Vulnerability from csaf_redhat - Published: 2018-05-21 23:20 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1647",
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1647.json"
}
],
"title": "Red Hat Security Advisory: java-1.7.0-openjdk security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:54+00:00",
"generator": {
"date": "2025-11-21T18:04:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1647",
"initial_release_date": "2018-05-21T23:20:13+00:00",
"revision_history": [
{
"date": "2018-05-21T23:20:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T23:20:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el6_9?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el6_9?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.181-2.6.14.8.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_id": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.181-2.6.14.8.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_id": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.181-2.6.14.8.el6_9?arch=i686\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_id": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.181-2.6.14.8.el6_9?arch=i686\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"product": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"product_id": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.181-2.6.14.8.el6_9?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"product": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.181-2.6.14.8.el6_9?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch"
},
"product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
},
"product_reference": "java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T23:20:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Client-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Client-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Client-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6ComputeNode-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Server-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Server-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Server-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.src",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-demo-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-devel-1:1.7.0.181-2.6.14.8.el6_9.x86_64",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-javadoc-1:1.7.0.181-2.6.14.8.el6_9.noarch",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.i686",
"6Workstation-optional-6.9.z:java-1.7.0-openjdk-src-1:1.7.0.181-2.6.14.8.el6_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3402
Vulnerability from csaf_redhat - Published: 2018-10-30 14:27 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3402",
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3402.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:40+00:00",
"generator": {
"date": "2025-11-21T18:06:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3402",
"initial_release_date": "2018-10-30T14:27:03+00:00",
"revision_history": [
{
"date": "2018-10-30T14:27:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T14:27:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-54.el6_7.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.9.i686",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.9.i686",
"product_id": "libvirt-0:0.10.2-54.el6_7.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.9.src",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.9.src",
"product_id": "libvirt-0:0.10.2-54.el6_7.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"product_id": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"product": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"product_id": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-54.el6_7.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"product": {
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"product_id": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-54.el6_7.9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"product_id": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-54.el6_7.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"product": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"product_id": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-54.el6_7.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"product": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"product_id": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-54.el6_7.9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T14:27:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6ComputeNode-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6ComputeNode-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.src",
"6Server-optional-6.7.EUS:libvirt-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-client-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-debuginfo-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-devel-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-lock-sanlock-0:0.10.2-54.el6_7.9.x86_64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.i686",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.ppc64",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.s390x",
"6Server-optional-6.7.EUS:libvirt-python-0:0.10.2-54.el6_7.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1660
Vulnerability from csaf_redhat - Published: 2018-05-21 23:20 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1660",
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1660.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:57+00:00",
"generator": {
"date": "2025-11-21T18:04:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1660",
"initial_release_date": "2018-05-21T23:20:09+00:00",
"revision_history": [
{
"date": "2018-05-21T23:20:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T23:20:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.503.el6_9.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.503.el6_9.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.503.el6_9.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.503.el6_9.6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.503.el6_9.6?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.503.el6_9.6?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.503.el6_9.6?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.503.el6_9.6?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.503.el6_9.6?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.503.el6_9.6?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T23:20:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Client-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Client-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Client-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6ComputeNode-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6ComputeNode-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6ComputeNode-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Server-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Server-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Server-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-guest-agent-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-img-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.src",
"6Workstation-6.9.z:qemu-kvm-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.i686",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.ppc64",
"6Workstation-6.9.z:qemu-kvm-debuginfo-2:0.12.1.2-2.503.el6_9.6.x86_64",
"6Workstation-6.9.z:qemu-kvm-tools-2:0.12.1.2-2.503.el6_9.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2396
Vulnerability from csaf_redhat - Published: 2018-08-14 20:17 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2396",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "1599860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599860"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2396.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:47+00:00",
"generator": {
"date": "2025-11-21T18:05:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2396",
"initial_release_date": "2018-08-14T20:17:22+00:00",
"revision_history": [
{
"date": "2018-08-14T20:17:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-08-14T20:17:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.37.4.rt56.629.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.37.4.rt56.629.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.37.4.rt56.629.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.37.4.rt56.629.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3620",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3620"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3620"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:17:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:17:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"Intel OSSIRT"
],
"organization": "Intel.com"
}
],
"cve": "CVE-2018-3646",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1585005"
}
],
"notes": [
{
"category": "description",
"text": "Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: hw: cpu: L1 terminal fault (L1TF)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "RHBZ#1585005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3646"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3562741",
"url": "https://access.redhat.com/articles/3562741"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/L1TF",
"url": "https://access.redhat.com/security/vulnerabilities/L1TF"
},
{
"category": "external",
"summary": "https://foreshadowattack.eu/",
"url": "https://foreshadowattack.eu/"
},
{
"category": "external",
"summary": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault",
"url": "https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow",
"url": "https://www.redhat.com/en/blog/deeper-look-l1-terminal-fault-aka-foreshadow"
},
{
"category": "external",
"summary": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know",
"url": "https://www.redhat.com/en/blog/understanding-l1-terminal-fault-aka-foreshadow-what-you-need-know"
}
],
"release_date": "2018-08-14T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-08-14T20:17:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.37.4.rt56.629.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.37.4.rt56.629.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: hw: cpu: L1 terminal fault (L1TF)"
}
]
}
RHSA-2018:2228
Vulnerability from csaf_redhat - Published: 2018-07-19 13:53 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 13.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2228",
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2228.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:33+00:00",
"generator": {
"date": "2025-11-21T18:05:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2228",
"initial_release_date": "2018-07-19T13:53:10+00:00",
"revision_history": [
{
"date": "2018-07-19T13:53:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-19T13:53:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 13.0",
"product": {
"name": "Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:13::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-19T13:53:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RH7-RHOS-13.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3397
Vulnerability from csaf_redhat - Published: 2018-10-30 12:53 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3397",
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3397.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:39+00:00",
"generator": {
"date": "2025-11-21T18:06:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3397",
"initial_release_date": "2018-10-30T12:53:01+00:00",
"revision_history": [
{
"date": "2018-10-30T12:53:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T12:53:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.415.el6_5.19?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.415.el6_5.19?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.415.el6_5.19?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.415.el6_5.19?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.415.el6_5.19?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.415.el6_5.19?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:53:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:qemu-guest-agent-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-img-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.src",
"6Server-6.5.AUS:qemu-kvm-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.415.el6_5.19.x86_64",
"6Server-6.5.AUS:qemu-kvm-tools-2:0.12.1.2-2.415.el6_5.19.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3424
Vulnerability from csaf_redhat - Published: 2018-10-30 18:56 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3424",
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3424.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:43+00:00",
"generator": {
"date": "2025-11-21T18:06:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3424",
"initial_release_date": "2018-10-30T18:56:39+00:00",
"revision_history": [
{
"date": "2018-10-30T18:56:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T18:56:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.479.el6_7.8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.479.el6_7.8?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.479.el6_7.8?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.479.el6_7.8?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.8?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.8?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.479.el6_7.8?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.479.el6_7.8?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T18:56:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6ComputeNode-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-guest-agent-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-img-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.src",
"6Server-6.7.EUS:qemu-kvm-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.i686",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.ppc64",
"6Server-6.7.EUS:qemu-kvm-debuginfo-2:0.12.1.2-2.479.el6_7.8.x86_64",
"6Server-6.7.EUS:qemu-kvm-tools-2:0.12.1.2-2.479.el6_7.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1629
Vulnerability from csaf_redhat - Published: 2018-05-22 01:39 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1629",
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1629.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:50+00:00",
"generator": {
"date": "2025-11-21T18:04:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1629",
"initial_release_date": "2018-05-22T01:39:27+00:00",
"revision_history": [
{
"date": "2018-05-22T01:39:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:39:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.3.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.3.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.3.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.3.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.3.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.3.2.el7.src",
"product_id": "kernel-0:3.10.0-862.3.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.3.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.3.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.3.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.3.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.3.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.3.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-Alt-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.3.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:39:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Client-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Client-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7ComputeNode-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7ComputeNode-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Server-optional-Alt-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Server-optional-Alt-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.src",
"7Workstation-optional-7.5.Z:kernel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-abi-whitelists-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-bootwrapper-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debug-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-s390x-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-debuginfo-common-x86_64-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-doc-0:3.10.0-862.3.2.el7.noarch",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-headers-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-kdump-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-kdump-devel-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:kernel-tools-libs-devel-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-0:3.10.0-862.3.2.el7.x86_64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.ppc64le",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.s390x",
"7Workstation-optional-7.5.Z:python-perf-debuginfo-0:3.10.0-862.3.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2060
Vulnerability from csaf_redhat - Published: 2018-06-27 08:25 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nBug Fix(es):\n\n* Previously, using device passthrough for a SCSI-2 device failed and returned an \"Illegal Request\" error. With this update, the QEMU emulator checks the SCSI version of the device when performing passthrough. As a result, the described problem no longer occurs. (BZ#1571370)\n \n* Under certain circumstances, resuming a paused guest generated redundant \"VIR_DOMAIN_PAUSED_UNKNOWN\" error messages in the libvirt log. This update corrects the event sending order when resuming guests, which prevents the errors being logged. (BZ#1582122)\n\nEnhancement(s):\n\n* With this update, Ceph storage is supported by KVM virtualization on all CPU architectures supported by Red Hat. (BZ#1588001)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2060",
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1582122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582122"
},
{
"category": "external",
"summary": "1588001",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588001"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2060.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:21+00:00",
"generator": {
"date": "2025-11-21T18:05:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2060",
"initial_release_date": "2018-06-27T08:25:23+00:00",
"revision_history": [
{
"date": "2018-06-27T08:25:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-27T08:25:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-27T08:25:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.ppc64le",
"7Server-RHEV-4-Agents-7:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1686
Vulnerability from csaf_redhat - Published: 2018-05-22 01:49 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1686",
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1686.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1686",
"initial_release_date": "2018-05-22T01:49:08+00:00",
"revision_history": [
{
"date": "2018-05-22T01:49:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:49:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:7::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.9.0-16.el7_4.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.9.0-16.el7_4.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_id": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.9.0-16.el7_4.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_id": "qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.9.0-16.el7_4.17?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.9.0-16.el7_4.17?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"product": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"product_id": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.9.0-16.el7_4.17?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src"
},
"product_reference": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
"product_id": "7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:49:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-7.0:qemu-img-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.src",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.17.x86_64",
"7Server-RH7-RHOS-7.0:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1639
Vulnerability from csaf_redhat - Published: 2018-05-29 16:32 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1639",
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1639.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1639",
"initial_release_date": "2018-05-29T16:32:14+00:00",
"revision_history": [
{
"date": "2018-05-29T16:32:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T16:32:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.69.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.69.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.69.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.69.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.69.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.69.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.69.3.el6.src",
"product_id": "kernel-0:2.6.32-504.69.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.69.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T16:32:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.src",
"6Server-optional-6.6.TUS:kernel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.69.3.el6.noarch",
"6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.69.3.el6.x86_64",
"6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.69.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1652
Vulnerability from csaf_redhat - Published: 2018-05-22 01:43 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1652",
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1652.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:55+00:00",
"generator": {
"date": "2025-11-21T18:04:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1652",
"initial_release_date": "2018-05-22T01:43:08+00:00",
"revision_history": [
{
"date": "2018-05-22T01:43:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:43:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-gluster@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-rbd@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-iscsi@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-scsi@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-logical@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-libs@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-mpath@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-disk@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage-core@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-admin@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"product": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"product_id": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@3.2.0-14.el7_4.10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:3.2.0-14.el7_4.10.src",
"product": {
"name": "libvirt-0:3.2.0-14.el7_4.10.src",
"product_id": "libvirt-0:3.2.0-14.el7_4.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@3.2.0-14.el7_4.10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.src",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.4)",
"product_id": "7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.src",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.4)",
"product_id": "7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
},
"product_reference": "libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:43:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7ComputeNode-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7ComputeNode-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.src",
"7Server-optional-7.4.EUS:libvirt-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-admin-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-client-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-config-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-interface-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-network-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nodedev-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-nwfilter-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-qemu-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-secret-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-core-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-disk-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-gluster-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-iscsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-logical-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-mpath-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-rbd-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-driver-storage-scsi-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-kvm-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-daemon-lxc-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-debuginfo-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-devel-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-docs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-libs-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-lock-sanlock-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-login-shell-0:3.2.0-14.el7_4.10.x86_64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.i686",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.ppc64le",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.s390x",
"7Server-optional-7.4.EUS:libvirt-nss-0:3.2.0-14.el7_4.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3398
Vulnerability from csaf_redhat - Published: 2018-10-30 13:36 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3398",
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3398.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:39+00:00",
"generator": {
"date": "2025-11-21T18:06:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3398",
"initial_release_date": "2018-10-30T13:36:53+00:00",
"revision_history": [
{
"date": "2018-10-30T13:36:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T13:36:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.13?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.13.src",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.13.src",
"product_id": "libvirt-0:2.0.0-10.el7_3.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.13?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.13?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-nss@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@2.0.0-10.el7_3.13?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"product": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"product_id": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@2.0.0-10.el7_3.13?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
},
"product_reference": "libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T13:36:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7ComputeNode-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7ComputeNode-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.src",
"7Server-optional-7.3.EUS:libvirt-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-client-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-config-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-interface-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-network-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nodedev-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-nwfilter-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-qemu-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-secret-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-driver-storage-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-kvm-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-daemon-lxc-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-debuginfo-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-devel-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-docs-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-lock-sanlock-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-login-shell-0:2.0.0-10.el7_3.13.x86_64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.i686",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.ppc64le",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.s390x",
"7Server-optional-7.3.EUS:libvirt-nss-0:2.0.0-10.el7_3.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2289
Vulnerability from csaf_redhat - Published: 2018-07-30 17:40 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform\n10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products.\n\nSecurity fix(es):\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nAcknowledgements:\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center)\nand Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2289",
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2289.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:39+00:00",
"generator": {
"date": "2025-11-21T18:05:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2289",
"initial_release_date": "2018-07-30T17:40:24+00:00",
"revision_history": [
{
"date": "2018-07-30T17:40:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-30T17:40:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 10.0",
"product": {
"name": "Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:10::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.4?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.4?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-30T17:40:24+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:qemu-img-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.src",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.4.x86_64",
"7Server-RH7-RHOS-10.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1646
Vulnerability from csaf_redhat - Published: 2018-05-22 01:45 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 8.0 (Liberty).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1646",
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1646.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:54+00:00",
"generator": {
"date": "2025-11-21T18:04:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1646",
"initial_release_date": "2018-05-22T01:45:37+00:00",
"revision_history": [
{
"date": "2018-05-22T01:45:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:45:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"product": {
"name": "Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:8::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_id": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.10.0-21.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64 as a component of Red Hat OpenStack Platform 8.0 (Liberty)",
"product_id": "7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-8.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:45:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"acknowledgments": [
{
"names": [
"CERT-CC",
"Cyrille Chatras"
],
"organization": "Orange.com"
}
],
"cve": "CVE-2018-7550",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1549798"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur while loading a kernel image during the guest boot, if mh_load_end_addr address is greater than the mh_bss_end_addr address. A user or process could use this flaw to potentially achieve arbitrary code execution on a host.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: i386: multiboot OOB access while loading kernel image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "RHBZ#1549798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7550"
}
],
"release_date": "2018-02-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:45:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: i386: multiboot OOB access while loading kernel image"
},
{
"acknowledgments": [
{
"names": [
"Ross Lagerwall"
],
"organization": "Citrix.com"
}
],
"cve": "CVE-2018-7858",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553402"
}
],
"notes": [
{
"category": "description",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "QEMU: cirrus: OOB access when updating VGA display",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "RHBZ#1553402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7858"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:45:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-8.0:qemu-img-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-common-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.src",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-rhev-debuginfo-10:2.10.0-21.el7_5.3.x86_64",
"7Server-RH7-RHOS-8.0:qemu-kvm-tools-rhev-10:2.10.0-21.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "QEMU: cirrus: OOB access when updating VGA display"
}
]
}
RHSA-2018:2172
Vulnerability from csaf_redhat - Published: 2018-07-11 15:39 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\n* kernel: A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service. (CVE-2017-14106)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2172",
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1487295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487295"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2172.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:29+00:00",
"generator": {
"date": "2025-11-21T18:05:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2172",
"initial_release_date": "2018-07-11T15:39:56+00:00",
"revision_history": [
{
"date": "2018-07-11T15:39:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-11T15:39:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-433.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-433.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-433.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-433.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-433.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-433.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-433.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-433.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-433.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-433.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-433.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-433.el5.s390x",
"product_id": "kernel-0:2.6.18-433.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-433.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-433.el5.i686",
"product_id": "kernel-devel-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-433.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-433.el5.i686",
"product_id": "kernel-debug-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-433.el5.i686",
"product_id": "kernel-xen-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-433.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-0:2.6.18-433.el5.i686",
"product_id": "kernel-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-433.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-433.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-433.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-433.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-433.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-433.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-433.el5.i386",
"product_id": "kernel-headers-0:2.6.18-433.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-433.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-433.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-433.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-433.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-433.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-433.el5.src",
"product": {
"name": "kernel-0:2.6.18-433.el5.src",
"product_id": "kernel-0:2.6.18-433.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-433.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-433.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-433.el5.src"
},
"product_reference": "kernel-0:2.6.18-433.el5.src",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-433.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-433.el5.noarch",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-433.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-433.el5.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-433.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-433.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-433.el5.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-433.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-433.el5.x86_64",
"relates_to_product_reference": "5Server-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-14106",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487295"
}
],
"notes": [
{
"category": "description",
"text": "A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Divide-by-zero in __tcp_select_window",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14106"
},
{
"category": "external",
"summary": "RHBZ#1487295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14106"
}
],
"release_date": "2017-09-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-11T15:39:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Divide-by-zero in __tcp_select_window"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-11T15:39:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"5Server-ELS:kernel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-0:2.6.18-433.el5.src",
"5Server-ELS:kernel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-PAE-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-PAE-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debug-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-debuginfo-common-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-devel-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-doc-0:2.6.18-433.el5.noarch",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.i386",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-headers-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-kdump-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-kdump-devel-0:2.6.18-433.el5.s390x",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-debuginfo-0:2.6.18-433.el5.x86_64",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.i686",
"5Server-ELS:kernel-xen-devel-0:2.6.18-433.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1663
Vulnerability from csaf_redhat - Published: 2018-05-22 01:40 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1663",
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1663.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:01+00:00",
"generator": {
"date": "2025-11-21T18:05:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1663",
"initial_release_date": "2018-05-22T01:40:25+00:00",
"revision_history": [
{
"date": "2018-05-22T01:40:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:40:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.7?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.7?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-141.el7_4.7?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.7?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-141.el7_4.7?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.src",
"product": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.src",
"product_id": "qemu-kvm-10:1.5.3-141.el7_4.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-141.el7_4.7?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"product_id": "qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.7?arch=ppc64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.7?arch=ppc64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"product": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"product_id": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-141.el7_4.7?arch=ppc64le\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-141.el7_4.7?arch=ppc64le\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.4)",
"product_id": "7ComputeNode-optional-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.7.src",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"relates_to_product_reference": "7Server-7.4.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:40:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7ComputeNode-optional-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-img-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.src",
"7Server-7.4.EUS:qemu-kvm-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-common-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.ppc64le",
"7Server-7.4.EUS:qemu-kvm-debuginfo-10:1.5.3-141.el7_4.7.x86_64",
"7Server-7.4.EUS:qemu-kvm-tools-10:1.5.3-141.el7_4.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1640
Vulnerability from csaf_redhat - Published: 2018-05-29 16:31 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1640",
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1640.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:51+00:00",
"generator": {
"date": "2025-11-21T18:04:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1640",
"initial_release_date": "2018-05-29T16:31:55+00:00",
"revision_history": [
{
"date": "2018-05-29T16:31:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T16:31:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.89.4.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.89.4.el6.src",
"product_id": "kernel-0:2.6.32-431.89.4.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.89.4.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "perf-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.89.4.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.89.4.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.89.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.89.4.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.89.4.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.89.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.89.4.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.89.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.89.4.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T16:31:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.89.4.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.89.4.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.89.4.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3425
Vulnerability from csaf_redhat - Published: 2018-10-30 18:56 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3425",
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3425.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:43+00:00",
"generator": {
"date": "2025-11-21T18:06:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3425",
"initial_release_date": "2018-10-30T18:56:19+00:00",
"revision_history": [
{
"date": "2018-10-30T18:56:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T18:56:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_id": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.448.el6_6.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_id": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.448.el6_6.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.448.el6_6.7?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_id": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-guest-agent@0.12.1.2-2.448.el6_6.7?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"product": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"product_id": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.448.el6_6.7?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64"
},
"product_reference": "qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T18:56:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.AUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.AUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-guest-agent-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-img-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.src",
"6Server-6.6.TUS:qemu-kvm-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-debuginfo-2:0.12.1.2-2.448.el6_6.7.x86_64",
"6Server-6.6.TUS:qemu-kvm-tools-2:0.12.1.2-2.448.el6_6.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1668
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1668",
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1668.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:59+00:00",
"generator": {
"date": "2025-11-21T18:04:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1668",
"initial_release_date": "2018-05-22T01:37:03+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-lxc@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-login-shell@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-kvm@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-network@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-lxc@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nodedev@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-docs@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-secret@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-qemu@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-nwfilter@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-nwfilter@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-interface@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-config-network@1.2.17-13.el7_2.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"product_id": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-daemon-driver-storage@1.2.17-13.el7_2.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"product": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"product_id": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@1.2.17-13.el7_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"product": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"product_id": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@1.2.17-13.el7_2.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"product": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"product_id": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@1.2.17-13.el7_2.8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:1.2.17-13.el7_2.8.src",
"product": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src",
"product_id": "libvirt-0:1.2.17-13.el7_2.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@1.2.17-13.el7_2.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
},
"product_reference": "libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.AUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.AUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.AUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.E4S:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.E4S:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.E4S:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.src",
"7Server-optional-7.2.TUS:libvirt-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-client-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-config-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-interface-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-network-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nodedev-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-nwfilter-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-qemu-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-secret-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-driver-storage-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-kvm-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-daemon-lxc-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-debuginfo-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.i686",
"7Server-optional-7.2.TUS:libvirt-devel-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-docs-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-lock-sanlock-0:1.2.17-13.el7_2.8.x86_64",
"7Server-optional-7.2.TUS:libvirt-login-shell-0:1.2.17-13.el7_2.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2948
Vulnerability from csaf_redhat - Published: 2018-10-30 12:05 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, aarch64)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)\n\nSpace precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article: \n\nhttps://access.redhat.com/articles/3658021\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391; Qualys Research Labs for reporting CVE-2018-1120; David Rientjes (Google) for reporting CVE-2018-1000200; and Wen Xu for reporting CVE-2018-1092, CVE-2018-1094, and CVE-2018-1095. The CVE-2018-14619 issue was discovered by Florian Weimer (Red Hat) and Ondrej Mosnacek (Red Hat).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2948",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3553061",
"url": "https://access.redhat.com/articles/3553061"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3658021",
"url": "https://access.redhat.com/articles/3658021"
},
{
"category": "external",
"summary": "1516257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257"
},
{
"category": "external",
"summary": "1528312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312"
},
{
"category": "external",
"summary": "1528323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323"
},
{
"category": "external",
"summary": "1533909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909"
},
{
"category": "external",
"summary": "1539508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508"
},
{
"category": "external",
"summary": "1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "1541846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846"
},
{
"category": "external",
"summary": "1547824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824"
},
{
"category": "external",
"summary": "1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "1551051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051"
},
{
"category": "external",
"summary": "1551565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565"
},
{
"category": "external",
"summary": "1552048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048"
},
{
"category": "external",
"summary": "1553361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361"
},
{
"category": "external",
"summary": "1560777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777"
},
{
"category": "external",
"summary": "1560788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788"
},
{
"category": "external",
"summary": "1560793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1568744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744"
},
{
"category": "external",
"summary": "1571062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062"
},
{
"category": "external",
"summary": "1571623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623"
},
{
"category": "external",
"summary": "1573699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699"
},
{
"category": "external",
"summary": "1575472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472"
},
{
"category": "external",
"summary": "1577408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408"
},
{
"category": "external",
"summary": "1583210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210"
},
{
"category": "external",
"summary": "1589324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324"
},
{
"category": "external",
"summary": "1590215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215"
},
{
"category": "external",
"summary": "1590799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799"
},
{
"category": "external",
"summary": "1596795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795"
},
{
"category": "external",
"summary": "1596802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802"
},
{
"category": "external",
"summary": "1596806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806"
},
{
"category": "external",
"summary": "1596812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812"
},
{
"category": "external",
"summary": "1596828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828"
},
{
"category": "external",
"summary": "1596842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842"
},
{
"category": "external",
"summary": "1596846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846"
},
{
"category": "external",
"summary": "1599161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161"
},
{
"category": "external",
"summary": "1601704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704"
},
{
"category": "external",
"summary": "1609664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664"
},
{
"category": "external",
"summary": "1610958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958"
},
{
"category": "external",
"summary": "1622004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004"
},
{
"category": "external",
"summary": "1623067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067"
},
{
"category": "external",
"summary": "1629636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2948.json"
}
],
"title": "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:06:21+00:00",
"generator": {
"date": "2025-11-21T18:06:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2948",
"initial_release_date": "2018-10-30T12:05:20+00:00",
"revision_history": [
{
"date": "2018-10-30T12:05:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T12:05:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_id": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_id": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-debug-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-debug-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "perf-0:4.14.0-115.el7a.ppc64le",
"product_id": "perf-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-devel-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-devel-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-tools-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-tools-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "python-perf-0:4.14.0-115.el7a.ppc64le",
"product_id": "python-perf-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.el7a?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.14.0-115.el7a.ppc64le",
"product": {
"name": "kernel-headers-0:4.14.0-115.el7a.ppc64le",
"product_id": "kernel-headers-0:4.14.0-115.el7a.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.el7a?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"product_id": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.el7a?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.14.0-115.el7a.noarch",
"product": {
"name": "kernel-doc-0:4.14.0-115.el7a.noarch",
"product_id": "kernel-doc-0:4.14.0-115.el7a.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.el7a?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-alt-0:4.14.0-115.el7a.src",
"product": {
"name": "kernel-alt-0:4.14.0-115.el7a.src",
"product_id": "kernel-alt-0:4.14.0-115.el7a.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.el7a?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.el7a.src",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)",
"product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-alt-0:4.14.0-115.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src"
},
"product_reference": "kernel-alt-0:4.14.0-115.el7a.src",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.14.0-115.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch"
},
"product_reference": "kernel-doc-0:4.14.0-115.el7a.noarch",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-headers-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "perf-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "python-perf-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)",
"product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"relates_to_product_reference": "7Server-optional-RHELALT-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13166",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1548412"
}
],
"notes": [
{
"category": "description",
"text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-13166"
},
{
"category": "external",
"summary": "RHBZ#1548412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13166"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166"
}
],
"release_date": "2017-07-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"category": "workaround",
"details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation"
},
{
"cve": "CVE-2017-16648",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2017-11-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1516257"
}
],
"notes": [
{
"category": "description",
"text": "The dvb frontend management subsystem in the Linux kernel contains a use-after-free which can allow a malicious user to write to memory that may be assigned to another kernel structure. This could create memory corruption, panic, or possibly other side affects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7, MRG-2 and real-time kernels.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux kernel-alt package.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-16648"
},
{
"category": "external",
"summary": "RHBZ#1516257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516257"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-16648",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16648"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16648"
}
],
"release_date": "2017-10-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c"
},
{
"cve": "CVE-2017-17805",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2017-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1528312"
}
],
"notes": [
{
"category": "description",
"text": "The Salsa20 encryption algorithm in the Linux kernel, before 4.14.8, does not correctly handle zero-length inputs. This allows a local attacker the ability to use the AF_ALG-based skcipher interface to cause a denial of service (uninitialized-memory free and kernel crash) or have an unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 are vulnerable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17805"
},
{
"category": "external",
"summary": "RHBZ#1528312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17805",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17805"
}
],
"release_date": "2017-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service"
},
{
"cve": "CVE-2017-17806",
"cwe": {
"id": "CWE-391",
"name": "Unchecked Error Condition"
},
"discovery_date": "2017-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1528323"
}
],
"notes": [
{
"category": "description",
"text": "The HMAC implementation (crypto/hmac.c) in the Linux kernel, before 4.14.8, does not validate that the underlying cryptographic hash algorithm is unkeyed. This allows a local attacker, able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3), to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17806"
},
{
"category": "external",
"summary": "RHBZ#1528323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528323"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17806"
}
],
"release_date": "2017-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HMAC implementation does not validate that the underlying cryptographic hash algorithm is unkeyed allowing local attackers to cause denial-of-service"
},
{
"cve": "CVE-2017-18075",
"cwe": {
"id": "CWE-628",
"name": "Function Call with Incorrectly Specified Arguments"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539508"
}
],
"notes": [
{
"category": "description",
"text": "crypto/pcrypt.c in the Linux kernel, before 4.14.13, mishandles freeing instances, allowing a local user able to access the AF_ALG-based AEAD interface (CONFIG_CRYPTO_USER_API_AEAD) and pcrypt (CONFIG_CRYPTO_PCRYPT) to cause a denial of service (kfree of an incorrect pointer) or possibly have unspecified other impact by executing a crafted sequence of system calls. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and 7, its real-time kernel and Red Hat Enterprise MRG 2, as the code with the flaw is not enabled and is not built in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18075"
},
{
"category": "external",
"summary": "RHBZ#1539508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539508"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18075",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18075"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18075"
}
],
"release_date": "2017-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service"
},
{
"cve": "CVE-2017-18208",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2018-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1551565"
}
],
"notes": [
{
"category": "description",
"text": "The madvise_willneed function in the Linux kernel allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18208"
},
{
"category": "external",
"summary": "RHBZ#1551565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551565"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18208",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18208"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18208"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/618064/",
"url": "https://lwn.net/Articles/618064/"
},
{
"category": "external",
"summary": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt",
"url": "https://www.kernel.org/doc/Documentation/filesystems/dax.txt"
}
],
"release_date": "2017-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service"
},
{
"cve": "CVE-2017-18344",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-07-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1610958"
}
],
"notes": [
{
"category": "description",
"text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18344"
},
{
"category": "external",
"summary": "RHBZ#1610958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610958"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18344",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18344"
}
],
"release_date": "2017-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"category": "workaround",
"details": "Attached to this bugzilla is a systemtap script that will prevent opening (and therefore reading) the /proc/\u003cprocess\u003e/timers file which is used to leak information.\n\nThe SystemTap script is relatively small and efficient, broken into 3 distinct sections as follows:\n\n--------\n\nprobe kernel.function(\"proc_timers_open@fs/proc/base.c\").return { \n // this is -EACCES\n\t$return = -13;\n message = sprintf(\"CVE-2017-18344 mitigation denied access to %s to %s(%d)\", file_name , execname(), pid());\n // print a warning message at KERN_INFO debug level\n printk(6, message);\n}\n\nprobe begin {\n printk(6, \"Mitigation for CVE-2017-18344 loaded.\\n\");\n}\n\n\nprobe end {\n printk(6, \"Mitigation for CVE-2017-18344 unloaded.\\n\");\n}\n\n\n---------\n\nFirst, the script places a probe at the return of the kernel function \u201cproc_timers_open\u201d when called. This modifies the return value to be EACCES which would return this value to userspace preventing this file from being opened. When the /proc/\u003cpid\u003e/timer file is attempted to be opened, a message will be logged to the kernel log subsystem showing the process and pid of the application attempting to access the timer file. \n\nThis file is not in widespread use at this time, although some applications may read from it to debug or understand their own timers that are set. This mitigation will not be useful in this context.\n\nFinally, the \u201cprobe begin\u201d and \u201cprobe end\u201d code blocks tell systemtap to add the supplied text to the kernel log buffer via the printk function. This creates an audit trail by registering in the system logs exactly when the mitigation is loaded and unloaded. This will need to be compiled with guru mode (-g parameter) to compile.\n\nThis will need to be loaded at each boot to remain effective. Red Hat Product security recommends updating to a patched kernel when it is available.\n\nRed Hat always seeks to provide both mitigations to disable attacks as well as the actual patches to treat the flaw. To learn more about SystemTap, and how it can be used in your management of your Red Hat systems, please refer to Using SystemTap[1] or one of our videos about it within our Customer Portal[2].\n\n1 - https://access.redhat.com/articles/17839\n2 - https://access.redhat.com/search/#/?q=systemtap",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c"
},
{
"cve": "CVE-2018-1065",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1547824"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the netfilter/iptables subsystem. A user with the netfilter modification capabilities could insert a rule which could panic the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1065"
},
{
"category": "external",
"summary": "RHBZ#1547824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547824"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1065"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1065"
}
],
"release_date": "2018-02-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: xtables NULL pointer dereference in ip6_tables.c:ip6t_do_table() leading to a crash"
},
{
"cve": "CVE-2018-1068",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-03-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1552048"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1068"
},
{
"category": "external",
"summary": "RHBZ#1552048",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552048"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1068",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1068"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1068"
}
],
"release_date": "2018-03-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c"
},
{
"acknowledgments": [
{
"names": [
"Wen Xu"
]
}
],
"cve": "CVE-2018-1092",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1560777"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/mballoc.c:ext4_process_freed_data() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a kernel panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1092"
},
{
"category": "external",
"summary": "RHBZ#1560777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1092",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1092"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1092"
}
],
"release_date": "2018-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in ext4/mballoc.c:ext4_process_freed_data() when mounting crafted ext4 image"
},
{
"acknowledgments": [
{
"names": [
"Wen Xu"
]
}
],
"cve": "CVE-2018-1094",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1560788"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel is vulnerable to a NULL pointer dereference in the ext4/xattr.c:ext4_xattr_inode_hash() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a NULL pointer dereference with a crafted ext4 image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1094"
},
{
"category": "external",
"summary": "RHBZ#1560788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1094"
}
],
"release_date": "2018-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image"
},
{
"acknowledgments": [
{
"names": [
"Wen Xu"
]
}
],
"cve": "CVE-2018-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1560793"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel is vulnerable to an out-of-bound access bug in the fs/posix_acl.c:get_acl() function. An attacker could trick a legitimate user or a privileged attacker could exploit this to cause a system crash or other unspecified impact with a crafted ext4 image. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1095"
},
{
"category": "external",
"summary": "RHBZ#1560793",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560793"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1095"
}
],
"release_date": "2018-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image"
},
{
"cve": "CVE-2018-1118",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-05-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1573699"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "RHBZ#1573699",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573699"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1118"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1118"
}
],
"release_date": "2018-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2018-1120",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-05-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1575472"
}
],
"notes": [
{
"category": "description",
"text": "By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1120"
},
{
"category": "external",
"summary": "RHBZ#1575472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575472"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1120"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1120"
},
{
"category": "external",
"summary": "http://seclists.org/oss-sec/2018/q2/122",
"url": "http://seclists.org/oss-sec/2018/q2/122"
}
],
"release_date": "2018-05-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
},
{
"cve": "CVE-2018-5344",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-01-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1533909"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s handling of loopback devices. An attacker, who has permissions to setup loopback disks, may create a denial of service or other unspecified actions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5344"
},
{
"category": "external",
"summary": "RHBZ#1533909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1533909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5344"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5344"
}
],
"release_date": "2018-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service"
},
{
"acknowledgments": [
{
"names": [
"Juha-Matti Tilli"
],
"organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs"
}
],
"cve": "CVE-2018-5390",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1601704"
}
],
"notes": [
{
"category": "description",
"text": "A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5390"
},
{
"category": "external",
"summary": "RHBZ#1601704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5390"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3553061",
"url": "https://access.redhat.com/articles/3553061"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/962459",
"url": "https://www.kb.cert.org/vuls/id/962459"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/netdev/msg514742.html",
"url": "https://www.spinics.net/lists/netdev/msg514742.html"
}
],
"release_date": "2018-08-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)"
},
{
"acknowledgments": [
{
"names": [
"Juha-Matti Tilli"
],
"organization": "Aalto University - Department of Communications and Networking and Nokia Bell Labs"
}
],
"cve": "CVE-2018-5391",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-07-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1609664"
}
],
"notes": [
{
"category": "description",
"text": "A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/3553061\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64, and Red Hat Enterprise Linux 7 for Power 9. Future kernel updates for the respective releases will address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, but to a lesser degree. As such, the issue severity for RHEL5 is considered Moderate. This is not currently planned to be addressed in future updates of the product due to its life cycle and the issue severity. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5391"
},
{
"category": "external",
"summary": "RHBZ#1609664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609664"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5391"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3553061",
"url": "https://access.redhat.com/articles/3553061"
},
{
"category": "external",
"summary": "https://www.kb.cert.org/vuls/id/641765",
"url": "https://www.kb.cert.org/vuls/id/641765"
}
],
"release_date": "2018-08-14T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"category": "workaround",
"details": "One may change the default 4MB and 3MB values of net.ipv4.ipfrag_high_thresh and net.ipv4.ipfrag_low_thresh (and their ipv6 counterparts net.ipv6.ipfrag_high_thresh and net.ipv6.ipfrag_low_thresh) to 256 kB and 192 kB (respectively) or below. Tests show some to significant CPU saturation drop during an attack, depending on a hardware, configuration and environment.\n\nThere can be some impact on performance though, due to ipfrag_high_thresh of 262144 bytes, as only two 64K fragments can fit in the reassembly queue at the same time. For example, there is a risk of breaking applications that rely on large UDP packets.\n\nSee the Mitigation section in the https://access.redhat.com/articles/3553061 article for the script to quickly change to/from default and lower settings.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: IP fragments with random offsets allow a remote denial of service (FragmentSmack)"
},
{
"cve": "CVE-2018-5750",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1539706"
}
],
"notes": [
{
"category": "description",
"text": "The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel, through 4.14.15, allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2, as KASLR feature is not present or enabled in these products.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5750"
},
{
"category": "external",
"summary": "RHBZ#1539706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5750",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5750"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5750"
}
],
"release_date": "2017-12-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass"
},
{
"cve": "CVE-2018-5803",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1551051"
}
],
"notes": [
{
"category": "description",
"text": "An error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "RHBZ#1551051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5803",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803"
}
],
"release_date": "2018-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service"
},
{
"cve": "CVE-2018-5848",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2018-05-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1590799"
}
],
"notes": [
{
"category": "description",
"text": "In the function wmi_set_ie() in the Linux kernel the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u2018ie_len\u2019 argument can cause a buffer overflow and thus a memory corruption leading to a system crash or other or unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-5848"
},
{
"category": "external",
"summary": "RHBZ#1590799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-5848",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5848"
}
],
"release_date": "2017-12-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption"
},
{
"cve": "CVE-2018-7566",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2018-01-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1550142"
}
],
"notes": [
{
"category": "description",
"text": "ALSA sequencer core initializes the event pool on demand by invoking snd_seq_pool_init() when the first write happens and the pool is empty. A user can reset the pool size manually via ioctl concurrently, and this may lead to UAF or out-of-bound access.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7566"
},
{
"category": "external",
"summary": "RHBZ#1550142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550142"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7566"
}
],
"release_date": "2018-02-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition in snd_seq_write() may lead to UAF or OOB-access"
},
{
"cve": "CVE-2018-7757",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2018-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1553361"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel allows local users to cause a denial of service (kernel memory exhaustion) via multiple read accesses to files in the /sys/class/sas_phy directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-7757"
},
{
"category": "external",
"summary": "RHBZ#1553361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553361"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7757"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7757"
}
],
"release_date": "2018-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c"
},
{
"cve": "CVE-2018-8781",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2018-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1571062"
}
],
"notes": [
{
"category": "description",
"text": "A an integer overflow vulnerability was discovered in the Linux kernel, from version 3.4 through 4.15, in the drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() function. An attacker with access to the udldrmfb driver could exploit this to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8781"
},
{
"category": "external",
"summary": "RHBZ#1571062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8781",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8781"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Integer overflow in drivers/gpu/drm/udl/udl_fb.c:udl_fb_mmap() can allow attackers to execute code in kernel space"
},
{
"cve": "CVE-2018-9363",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-08-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1623067"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow due to a singed-unsigned comparsion was found in hidp_process_report() in the net/bluetooth/hidp/core.c in the Linux kernel. The buffer length is an unsigned int but gets cast to a signed int which in certain conditions can lead to a system panic and a denial-of-service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overflow in hidp_process_report",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-9363"
},
{
"category": "external",
"summary": "RHBZ#1623067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-9363",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-9363"
}
],
"release_date": "2018-08-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overflow in hidp_process_report"
},
{
"cve": "CVE-2018-10322",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1571623"
}
],
"notes": [
{
"category": "description",
"text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel can cause a NULL pointer dereference in xfs_ilock_attr_map_shared function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted xfs filesystem image to cause a kernel panic and thus a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10322"
},
{
"category": "external",
"summary": "RHBZ#1571623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10322",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10322"
}
],
"release_date": "2018-04-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service"
},
{
"cve": "CVE-2018-10877",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596795"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10877"
},
{
"category": "external",
"summary": "RHBZ#1596795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596795"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10877",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10877"
}
],
"release_date": "2018-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image"
},
{
"cve": "CVE-2018-10878",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596802"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10878"
},
{
"category": "external",
"summary": "RHBZ#1596802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10878"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10878"
}
],
"release_date": "2018-05-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image"
},
{
"cve": "CVE-2018-10879",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596806"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10879"
},
{
"category": "external",
"summary": "RHBZ#1596806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10879",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10879"
}
],
"release_date": "2018-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file"
},
{
"cve": "CVE-2018-10880",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596812"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem code. A stack-out-of-bounds write in ext4_update_inline_data() is possible when mounting and writing to a crafted ext4 image. An attacker could use this to cause a system crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack-out-of-bounds write in ext4_update_inline_data function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10880"
},
{
"category": "external",
"summary": "RHBZ#1596812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10880",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10880"
}
],
"release_date": "2018-06-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack-out-of-bounds write in ext4_update_inline_data function"
},
{
"cve": "CVE-2018-10881",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596828"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10881"
},
{
"category": "external",
"summary": "RHBZ#1596828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596828"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10881"
}
],
"release_date": "2018-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image"
},
{
"cve": "CVE-2018-10882",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596842"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in the fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10882"
},
{
"category": "external",
"summary": "RHBZ#1596842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10882",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10882"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10882"
}
],
"release_date": "2018-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack-out-of-bounds write infs/jbd2/transaction.c"
},
{
"cve": "CVE-2018-10883",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2018-06-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1596846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s ext4 filesystem. A local user can cause an out-of-bound write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10883"
},
{
"category": "external",
"summary": "RHBZ#1596846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10883",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10883"
}
],
"release_date": "2018-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function"
},
{
"cve": "CVE-2018-10940",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1577408"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel, before 4.16.6 where the cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-10940"
},
{
"category": "external",
"summary": "RHBZ#1577408",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577408"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-10940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10940"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10940"
}
],
"release_date": "2018-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c"
},
{
"cve": "CVE-2018-11506",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2018-05-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1583210"
}
],
"notes": [
{
"category": "description",
"text": "The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel allows local users to cause a denial of service via a stack-based buffer overflow or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-11506"
},
{
"category": "external",
"summary": "RHBZ#1583210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583210"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-11506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11506"
}
],
"release_date": "2018-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact"
},
{
"cve": "CVE-2018-12232",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1590215"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference issue was found in the Linux kernel. If the close() and fchownat() system calls share a socket file descriptor as an argument, then the two calls can race and trigger a NULL pointer dereference leading to a system crash and a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12232"
},
{
"category": "external",
"summary": "RHBZ#1590215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12232",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12232"
}
],
"release_date": "2018-06-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor"
},
{
"cve": "CVE-2018-13405",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2018-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1599161"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "RHBZ#1599161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13405"
}
],
"release_date": "2018-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Missing check in fs/inode.c:inode_init_owner() does not clear SGID bit on non-directories for non-members"
},
{
"acknowledgments": [
{
"names": [
"Florian Weimer",
"Ondrej Mosnacek"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2018-14619",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1622004"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto subsystem that allowed an attacker \r\nto crash the system or possibly escalate privileges with a specially crafted program.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crash (possible privesc) in kernel crypto api.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14619"
},
{
"category": "external",
"summary": "RHBZ#1622004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14619",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14619"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14619"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b32a7dc8aef1882fbf983eb354837488cc9d54dc"
}
],
"release_date": "2018-08-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: crash (possible privesc) in kernel crypto api."
},
{
"cve": "CVE-2018-14641",
"cwe": {
"id": "CWE-456",
"name": "Missing Initialization of a Variable"
},
"discovery_date": "2018-09-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1629636"
}
],
"notes": [
{
"category": "description",
"text": "A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus leading to a remote denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14641"
},
{
"category": "external",
"summary": "RHBZ#1629636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629636"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14641"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14641"
}
],
"release_date": "2018-09-18T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()"
},
{
"cve": "CVE-2018-1000026",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-02-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1541846"
}
],
"notes": [
{
"category": "description",
"text": "Improper validation in the bnx2x network card driver of the Linux kernel version 4.15 can allow for denial of service (DoS) attacks via a packet with a gso_size larger than ~9700 bytes. Untrusted guest VMs can exploit this vulnerability in the host machine, causing a crash in the network card.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as supported configurations are not affected.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000026"
},
{
"category": "external",
"summary": "RHBZ#1541846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000026",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000026"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000026"
}
],
"release_date": "2018-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet"
},
{
"acknowledgments": [
{
"names": [
"David Rientjes"
],
"organization": "Google"
}
],
"cve": "CVE-2018-1000200",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2018-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1568744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel where an out of memory (oom) killing of a process that has large spans of mlocked memory can result in deferencing a NULL pointer, leading to denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: NULL pointer dereference on OOM kill of large mlocked process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000200"
},
{
"category": "external",
"summary": "RHBZ#1568744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000200"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000200"
}
],
"release_date": "2018-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: NULL pointer dereference on OOM kill of large mlocked process"
},
{
"cve": "CVE-2018-1000204",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1589324"
}
],
"notes": [
{
"category": "description",
"text": "A malformed SG_IO ioctl issued for a SCSI device in the Linux kernel leads to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-1000204"
},
{
"category": "external",
"summary": "RHBZ#1589324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000204"
}
],
"release_date": "2018-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:05:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.el7a.src",
"7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.el7a.noarch",
"7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.el7a.ppc64le",
"7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.el7a.ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Infoleak caused by incorrect handling of the SG_IO ioctl"
}
]
}
RHSA-2018:1651
Vulnerability from csaf_redhat - Published: 2018-05-21 23:20 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86 (both 32 and 64 bit) architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, an erroneous code in the x86 kexec system call path caused a memory corruption. As a consequence, the system became unresponsive with the following kernel stack trace:\n\n\u0027WARNING: CPU: 13 PID: 36409 at lib/list_debug.c:59 __list_del_entry+0xa1/0xd0 list_del corruption. prev-\u003enext should be ffffdd03fddeeca0, but was (null)\u0027\n\nThis update ensures that the code does not corrupt memory. As a result, the operating system no longer hangs. (BZ#1573176)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1651",
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1651.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:04:55+00:00",
"generator": {
"date": "2025-11-21T18:04:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1651",
"initial_release_date": "2018-05-21T23:20:27+00:00",
"revision_history": [
{
"date": "2018-05-21T23:20:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-21T23:20:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "perf-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.30.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.30.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-696.30.1.el6.i686",
"product_id": "perf-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.30.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.30.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686",
"product_id": "python-perf-0:2.6.32-696.30.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.30.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.30.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.30.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.30.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.30.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-696.30.1.el6.src",
"product_id": "kernel-0:2.6.32-696.30.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.30.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x",
"product_id": "perf-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.30.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.30.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "perf-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-696.30.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.30.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-21T23:20:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Client-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Server-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.src",
"6Workstation-optional-6.9.z:kernel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.30.1.el6.noarch",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.30.1.el6.x86_64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.i686",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.ppc64",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.s390x",
"6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.30.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2328
Vulnerability from csaf_redhat - Published: 2018-07-31 17:50 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhvm-setup-plugins is now available for Red Hat Virtualization Engine 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhvm-setup-plugins package adds functionality exclusive only to Red Hat Virtualization Manager, and is not available for the upstream ovirt-engine. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.\n\nThe following packages have been upgraded to a later upstream version: rhvm-setup-plugins (4.2.10). (BZ#1596152)\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* This update adds support for IBM POWER9 hypervisors with RHEL-ALT and POWER9 guests. It also adds support for POWER8 guests on a POWER9 hypervisor and live migration of POWER8 guests between POWER8 and POWER9 hypervisors. (BZ#1592320)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2328",
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1592320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592320"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2328.json"
}
],
"title": "Red Hat Security Advisory: rhvm-setup-plugins security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:05:41+00:00",
"generator": {
"date": "2025-11-21T18:05:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2328",
"initial_release_date": "2018-07-31T17:50:20+00:00",
"revision_history": [
{
"date": "2018-07-31T17:50:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-31T17:50:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHV-M 4.2",
"product": {
"name": "RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.src",
"product": {
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.src",
"product_id": "rhvm-setup-plugins-0:4.2.10-1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.2.10-1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"product": {
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"product_id": "rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhvm-setup-plugins@4.2.10-1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch"
},
"product_reference": "rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHV-S-4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhvm-setup-plugins-0:4.2.10-1.el7ev.src as a component of RHV-M 4.2",
"product_id": "7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.src"
},
"product_reference": "rhvm-setup-plugins-0:4.2.10-1.el7ev.src",
"relates_to_product_reference": "7Server-RHV-S-4.2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-31T17:50:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.noarch",
"7Server-RHV-S-4.2:rhvm-setup-plugins-0:4.2.10-1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2019:0148
Vulnerability from csaf_redhat - Published: 2019-01-23 15:39 - Updated: 2025-11-21 18:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:0148",
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0148.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm-rhev security update",
"tracking": {
"current_release_date": "2025-11-21T18:07:21+00:00",
"generator": {
"date": "2025-11-21T18:07:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:0148",
"initial_release_date": "2019-01-23T15:39:17+00:00",
"revision_history": [
{
"date": "2019-01-23T15:39:17+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-01-23T15:39:17+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:07:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack_els:7::el7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product": {
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_id": "qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img-rhev@2.9.0-16.el7_4.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_id": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.9.0-16.el7_4.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"product": {
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"product_id": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@2.9.0-16.el7_4.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product": {
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_id": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools-rhev@2.9.0-16.el7_4.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product": {
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_id": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common-rhev@2.9.0-16.el7_4.18?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"product": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"product_id": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-rhev@2.9.0-16.el7_4.18?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64"
},
"product_reference": "qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64"
},
"product_reference": "qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src"
},
"product_reference": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64"
},
"product_reference": "qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64"
},
"product_reference": "qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.4 EUS",
"product_id": "7Server-RH7-RHOS-7.0-ELS:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64"
},
"product_reference": "qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-7.0-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-7.0-ELS:qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-01-23T15:39:17+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-RH7-RHOS-7.0-ELS:qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-7.0-ELS:qemu-img-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-common-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.src",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-rhev-debuginfo-10:2.9.0-16.el7_4.18.x86_64",
"7Server-RH7-RHOS-7.0-ELS:qemu-kvm-tools-rhev-10:2.9.0-16.el7_4.18.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1666
Vulnerability from csaf_redhat - Published: 2018-05-22 01:37 - Updated: 2025-11-21 18:04Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1666",
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1666.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:04:58+00:00",
"generator": {
"date": "2025-11-21T18:04:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1666",
"initial_release_date": "2018-05-22T01:37:53+00:00",
"revision_history": [
{
"date": "2018-05-22T01:37:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-22T01:37:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:04:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-46.el6_6.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-46.el6_6.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-46.el6_6.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-46.el6_6.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-46.el6_6.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"product_id": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-46.el6_6.8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"product_id": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-46.el6_6.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-46.el6_6.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"product": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"product_id": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-46.el6_6.8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-46.el6_6.8.src",
"product": {
"name": "libvirt-0:0.10.2-46.el6_6.8.src",
"product_id": "libvirt-0:0.10.2-46.el6_6.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-46.el6_6.8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-22T01:37:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.AUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.AUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.AUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.src",
"6Server-optional-6.6.TUS:libvirt-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-client-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-debuginfo-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.i686",
"6Server-optional-6.6.TUS:libvirt-devel-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-lock-sanlock-0:0.10.2-46.el6_6.8.x86_64",
"6Server-optional-6.6.TUS:libvirt-python-0:0.10.2-46.el6_6.8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3423
Vulnerability from csaf_redhat - Published: 2018-10-30 18:56 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3423",
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3423.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:46+00:00",
"generator": {
"date": "2025-11-21T18:06:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3423",
"initial_release_date": "2018-10-30T18:56:09+00:00",
"revision_history": [
{
"date": "2018-10-30T18:56:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T18:56:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-tools@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"product_id": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.18?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-105.el7_2.18?arch=i686\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"product": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"product_id": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard-devel@1.5.3-105.el7_2.18?arch=i686\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "libcacard-10:1.5.3-105.el7_2.18.i686",
"product": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686",
"product_id": "libcacard-10:1.5.3-105.el7_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libcacard@1.5.3-105.el7_2.18?arch=i686\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"product": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"product_id": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-105.el7_2.18?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T18:56:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.AUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.AUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.AUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.E4S:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.E4S:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.E4S:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:libcacard-devel-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:libcacard-tools-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-img-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.src",
"7Server-optional-7.2.TUS:qemu-kvm-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-common-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.i686",
"7Server-optional-7.2.TUS:qemu-kvm-debuginfo-10:1.5.3-105.el7_2.18.x86_64",
"7Server-optional-7.2.TUS:qemu-kvm-tools-10:1.5.3-105.el7_2.18.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:3396
Vulnerability from csaf_redhat - Published: 2018-10-30 12:25 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libvirt is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3396",
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3396.json"
}
],
"title": "Red Hat Security Advisory: libvirt security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:38+00:00",
"generator": {
"date": "2025-11-21T18:06:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3396",
"initial_release_date": "2018-10-30T12:25:56+00:00",
"revision_history": [
{
"date": "2018-10-30T12:25:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-10-30T12:25:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.10.2-29.el6_5.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-29.el6_5.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-29.el6_5.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-29.el6_5.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-29.el6_5.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"product": {
"name": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"product_id": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.10.2-29.el6_5.17?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.10.2-29.el6_5.17.src",
"product": {
"name": "libvirt-0:0.10.2-29.el6_5.17.src",
"product_id": "libvirt-0:0.10.2-29.el6_5.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.10.2-29.el6_5.17?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"product": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"product_id": "libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.10.2-29.el6_5.17?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"product": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"product_id": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.10.2-29.el6_5.17?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.10.2-29.el6_5.17.i686",
"product": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.i686",
"product_id": "libvirt-client-0:0.10.2-29.el6_5.17.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.10.2-29.el6_5.17?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.17.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.17.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.17.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.17.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64"
},
"product_reference": "libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-10-30T12:25:56+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted automatically.",
"product_ids": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.src",
"6Server-optional-6.5.AUS:libvirt-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-client-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-debuginfo-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.i686",
"6Server-optional-6.5.AUS:libvirt-devel-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-lock-sanlock-0:0.10.2-29.el6_5.17.x86_64",
"6Server-optional-6.5.AUS:libvirt-python-0:0.10.2-29.el6_5.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:1737
Vulnerability from csaf_redhat - Published: 2018-05-29 18:55 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system might be required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update, mitigation for PowerPC architecture is provided.\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3461451",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1737",
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/3461451",
"url": "https://access.redhat.com/articles/3461451"
},
{
"category": "external",
"summary": "1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1737.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:05:06+00:00",
"generator": {
"date": "2025-11-21T18:05:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:1737",
"initial_release_date": "2018-05-29T18:55:03+00:00",
"revision_history": [
{
"date": "2018-05-29T18:55:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-05-29T18:55:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.51.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.51.1.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "perf-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.51.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.51.1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.51.1.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.51.1.el7.src",
"product_id": "kernel-0:3.10.0-514.51.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.51.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.51.1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "perf-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.51.1.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.51.1.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"product_id": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "perf-0:3.10.0-514.51.1.el7.s390x",
"product_id": "perf-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.51.1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.51.1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.src",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)",
"product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
"product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.src",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
"product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.51.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
"product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18017",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2018-01-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1531135"
}
],
"notes": [
{
"category": "description",
"text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-18017"
},
{
"category": "external",
"summary": "RHBZ#1531135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18017"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017"
}
],
"release_date": "2018-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T18:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c"
},
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-05-29T18:55:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.src",
"7Server-optional-7.3.EUS:kernel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.51.1.el7.noarch",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.51.1.el7.x86_64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.ppc64le",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.s390x",
"7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.51.1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2246
Vulnerability from csaf_redhat - Published: 2018-07-24 10:37 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rhev-hypervisor7 is now available for RHEV 3.X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2246",
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "1600050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600050"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2246.json"
}
],
"title": "Red Hat Security Advisory: rhev-hypervisor7 security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:35+00:00",
"generator": {
"date": "2025-11-21T18:05:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2246",
"initial_release_date": "2018-07-24T10:37:35+00:00",
"revision_history": [
{
"date": "2018-07-24T10:37:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-07-24T10:37:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV Hypervisor for RHEL-6 ELS",
"product": {
"name": "RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H ELS",
"product": {
"name": "RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"product_id": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180710.1.el6ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.src",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.src",
"product_id": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180710.1.el7ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"product_id": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180710.1.el6ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"product": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"product_id": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor7@7.3-20180710.1.el7ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch as a component of RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.src as a component of RHEV Hypervisor for RHEL-6 ELS",
"product_id": "6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.src"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"relates_to_product_reference": "6Server-RHEV-Hypervisor-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.src as a component of RHEL 7-based RHEV-H ELS",
"product_id": "7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.src"
},
"product_reference": "rhev-hypervisor7-0:7.3-20180710.1.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-Hypervisor-ELS-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-07-24T10:37:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.noarch",
"6Server-RHEV-Hypervisor-ELS:rhev-hypervisor7-0:7.3-20180710.1.el6ev.src",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.noarch",
"7Server-RHEV-Hypervisor-ELS-7:rhev-hypervisor7-0:7.3-20180710.1.el7ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
RHSA-2018:2001
Vulnerability from csaf_redhat - Published: 2018-06-26 16:52 - Updated: 2025-11-21 18:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for qemu-kvm is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2001",
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2001.json"
}
],
"title": "Red Hat Security Advisory: qemu-kvm security update",
"tracking": {
"current_release_date": "2025-11-21T18:05:18+00:00",
"generator": {
"date": "2025-11-21T18:05:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2001",
"initial_release_date": "2018-06-26T16:52:47+00:00",
"revision_history": [
{
"date": "2018-06-26T16:52:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-06-26T16:52:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:05:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"product_id": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@1.5.3-156.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"product_id": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-156.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"product_id": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-common@1.5.3-156.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"product": {
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"product_id": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-img@1.5.3-156.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
},
{
"category": "product_version",
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"product": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"product_id": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm-tools@1.5.3-156.el7_5.3?arch=x86_64\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"product": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"product_id": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/qemu-kvm@1.5.3-156.el7_5.3?arch=src\u0026epoch=10"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Client-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Server-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-img-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.src",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
},
"product_reference": "qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"relates_to_product_reference": "7Workstation-7.5.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
},
{
"names": [
"Ken Johnson"
],
"organization": "Microsoft Security Response Center"
}
],
"cve": "CVE-2018-3639",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2018-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1566890"
}
],
"notes": [
{
"category": "description",
"text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: speculative store bypass",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "RHBZ#1566890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ssbd",
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf",
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf"
},
{
"category": "external",
"summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf",
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
}
],
"release_date": "2018-05-21T21:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-06-26T16:52:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.",
"product_ids": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Client-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Client-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7ComputeNode-optional-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7ComputeNode-optional-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Server-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Server-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-img-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.src",
"7Workstation-7.5.Z:qemu-kvm-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-common-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-debuginfo-10:1.5.3-156.el7_5.3.x86_64",
"7Workstation-7.5.Z:qemu-kvm-tools-10:1.5.3-156.el7_5.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: cpu: speculative store bypass"
}
]
}
OPENSUSE-SU-2024:11008-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libvirt-7.7.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libvirt-7.7.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11008",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11008-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-5086 page",
"url": "https://www.suse.com/security/cve/CVE-2008-5086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000256 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2635 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12127 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10132 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10161 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10166 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10167 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10168 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3886 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10701 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10701/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14339 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14339/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15708 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25637 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3631 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3667 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3667/"
}
],
"title": "libvirt-7.7.0-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11008-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-7.7.0-2.1.aarch64",
"product_id": "libvirt-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-client-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-client-7.7.0-2.1.aarch64",
"product_id": "libvirt-client-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-config-network-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-interface-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-network-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-secret-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-hooks-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-lxc-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-qemu-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-daemon-xen-7.7.0-2.1.aarch64",
"product_id": "libvirt-daemon-xen-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-devel-7.7.0-2.1.aarch64",
"product_id": "libvirt-devel-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-devel-32bit-7.7.0-2.1.aarch64",
"product_id": "libvirt-devel-32bit-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-doc-7.7.0-2.1.aarch64",
"product_id": "libvirt-doc-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-libs-7.7.0-2.1.aarch64",
"product_id": "libvirt-libs-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"product_id": "libvirt-lock-sanlock-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-7.7.0-2.1.aarch64",
"product": {
"name": "libvirt-nss-7.7.0-2.1.aarch64",
"product_id": "libvirt-nss-7.7.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"product": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"product_id": "wireshark-plugin-libvirt-7.7.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-7.7.0-2.1.ppc64le",
"product_id": "libvirt-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-client-7.7.0-2.1.ppc64le",
"product_id": "libvirt-client-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-config-network-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-hooks-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-lxc-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-qemu-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"product_id": "libvirt-daemon-xen-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-devel-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-devel-7.7.0-2.1.ppc64le",
"product_id": "libvirt-devel-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"product_id": "libvirt-devel-32bit-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-doc-7.7.0-2.1.ppc64le",
"product_id": "libvirt-doc-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-libs-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-libs-7.7.0-2.1.ppc64le",
"product_id": "libvirt-libs-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"product_id": "libvirt-lock-sanlock-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-7.7.0-2.1.ppc64le",
"product": {
"name": "libvirt-nss-7.7.0-2.1.ppc64le",
"product_id": "libvirt-nss-7.7.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"product": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"product_id": "wireshark-plugin-libvirt-7.7.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-7.7.0-2.1.s390x",
"product_id": "libvirt-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-client-7.7.0-2.1.s390x",
"product_id": "libvirt-client-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-config-network-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-interface-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-libxl-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-network-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-secret-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-hooks-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-lxc-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-qemu-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-daemon-xen-7.7.0-2.1.s390x",
"product_id": "libvirt-daemon-xen-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-devel-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-devel-7.7.0-2.1.s390x",
"product_id": "libvirt-devel-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-devel-32bit-7.7.0-2.1.s390x",
"product_id": "libvirt-devel-32bit-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-doc-7.7.0-2.1.s390x",
"product_id": "libvirt-doc-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-libs-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-libs-7.7.0-2.1.s390x",
"product_id": "libvirt-libs-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.s390x",
"product_id": "libvirt-lock-sanlock-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-7.7.0-2.1.s390x",
"product": {
"name": "libvirt-nss-7.7.0-2.1.s390x",
"product_id": "libvirt-nss-7.7.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"product": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"product_id": "wireshark-plugin-libvirt-7.7.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-7.7.0-2.1.x86_64",
"product_id": "libvirt-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-client-7.7.0-2.1.x86_64",
"product_id": "libvirt-client-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-config-network-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-network-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-hooks-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-lxc-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-qemu-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-7.7.0-2.1.x86_64",
"product_id": "libvirt-daemon-xen-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-devel-7.7.0-2.1.x86_64",
"product_id": "libvirt-devel-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-devel-32bit-7.7.0-2.1.x86_64",
"product_id": "libvirt-devel-32bit-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-doc-7.7.0-2.1.x86_64",
"product_id": "libvirt-doc-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-libs-7.7.0-2.1.x86_64",
"product_id": "libvirt-libs-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"product_id": "libvirt-lock-sanlock-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-7.7.0-2.1.x86_64",
"product": {
"name": "libvirt-nss-7.7.0-2.1.x86_64",
"product_id": "libvirt-nss-7.7.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "wireshark-plugin-libvirt-7.7.0-2.1.x86_64",
"product": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.x86_64",
"product_id": "wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-client-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-client-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-client-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-client-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-daemon-xen-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-daemon-xen-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-devel-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-devel-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-devel-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-devel-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-devel-32bit-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-devel-32bit-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-devel-32bit-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-doc-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-doc-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-doc-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-doc-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-libs-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-libs-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-libs-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-libs-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64"
},
"product_reference": "libvirt-nss-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le"
},
"product_reference": "libvirt-nss-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x"
},
"product_reference": "libvirt-nss-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64"
},
"product_reference": "libvirt-nss-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64"
},
"product_reference": "wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le"
},
"product_reference": "wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x"
},
"product_reference": "wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wireshark-plugin-libvirt-7.7.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
},
"product_reference": "wireshark-plugin-libvirt-7.7.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-5086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-5086"
}
],
"notes": [
{
"category": "general",
"text": "Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-5086",
"url": "https://www.suse.com/security/cve/CVE-2008-5086"
},
{
"category": "external",
"summary": "SUSE Bug 459009 for CVE-2008-5086",
"url": "https://bugzilla.suse.com/459009"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2008-5086"
},
{
"cve": "CVE-2017-1000256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000256"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version 2.3.0 and later is vulnerable to a bad default configuration of \"verify-peer=no\" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000256",
"url": "https://www.suse.com/security/cve/CVE-2017-1000256"
},
{
"category": "external",
"summary": "SUSE Bug 1062563 for CVE-2017-1000256",
"url": "https://bugzilla.suse.com/1062563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000256"
},
{
"cve": "CVE-2017-2635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2635"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2635",
"url": "https://www.suse.com/security/cve/CVE-2017-2635"
},
{
"category": "external",
"summary": "SUSE Bug 1027075 for CVE-2017-2635",
"url": "https://bugzilla.suse.com/1027075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-2635"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12127"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12127",
"url": "https://www.suse.com/security/cve/CVE-2018-12127"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12127",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12127"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
},
{
"cve": "CVE-2019-10132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10132"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libvirt \u003e= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10132",
"url": "https://www.suse.com/security/cve/CVE-2019-10132"
},
{
"category": "external",
"summary": "SUSE Bug 1134348 for CVE-2019-10132",
"url": "https://bugzilla.suse.com/1134348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10132"
},
{
"cve": "CVE-2019-10161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10161"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10161",
"url": "https://www.suse.com/security/cve/CVE-2019-10161"
},
{
"category": "external",
"summary": "SUSE Bug 1138301 for CVE-2019-10161",
"url": "https://bugzilla.suse.com/1138301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10161"
},
{
"cve": "CVE-2019-10166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10166"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10166",
"url": "https://www.suse.com/security/cve/CVE-2019-10166"
},
{
"category": "external",
"summary": "SUSE Bug 1138302 for CVE-2019-10166",
"url": "https://bugzilla.suse.com/1138302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10166"
},
{
"cve": "CVE-2019-10167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10167"
}
],
"notes": [
{
"category": "general",
"text": "The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an \"emulatorbin\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10167",
"url": "https://www.suse.com/security/cve/CVE-2019-10167"
},
{
"category": "external",
"summary": "SUSE Bug 1138303 for CVE-2019-10167",
"url": "https://bugzilla.suse.com/1138303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10167"
},
{
"cve": "CVE-2019-10168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10168"
}
],
"notes": [
{
"category": "general",
"text": "The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an \"emulator\" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain\u0027s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10168",
"url": "https://www.suse.com/security/cve/CVE-2019-10168"
},
{
"category": "external",
"summary": "SUSE Bug 1138305 for CVE-2019-10168",
"url": "https://bugzilla.suse.com/1138305"
},
{
"category": "external",
"summary": "SUSE Bug 1138582 for CVE-2019-10168",
"url": "https://bugzilla.suse.com/1138582"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-10168"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-3886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3886"
}
],
"notes": [
{
"category": "general",
"text": "An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3886",
"url": "https://www.suse.com/security/cve/CVE-2019-3886"
},
{
"category": "external",
"summary": "SUSE Bug 1131595 for CVE-2019-3886",
"url": "https://bugzilla.suse.com/1131595"
},
{
"category": "external",
"summary": "SUSE Bug 1133150 for CVE-2019-3886",
"url": "https://bugzilla.suse.com/1133150"
},
{
"category": "external",
"summary": "SUSE Bug 1138301 for CVE-2019-3886",
"url": "https://bugzilla.suse.com/1138301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3886"
},
{
"cve": "CVE-2020-10701",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10701"
}
],
"notes": [
{
"category": "general",
"text": "A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10701",
"url": "https://www.suse.com/security/cve/CVE-2020-10701"
},
{
"category": "external",
"summary": "SUSE Bug 1168680 for CVE-2020-10701",
"url": "https://bugzilla.suse.com/1168680"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10701"
},
{
"cve": "CVE-2020-14339",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14339"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14339",
"url": "https://www.suse.com/security/cve/CVE-2020-14339"
},
{
"category": "external",
"summary": "SUSE Bug 1174458 for CVE-2020-14339",
"url": "https://bugzilla.suse.com/1174458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14339"
},
{
"cve": "CVE-2020-15708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15708"
}
],
"notes": [
{
"category": "general",
"text": "Ubuntu\u0027s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15708",
"url": "https://www.suse.com/security/cve/CVE-2020-15708"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-15708",
"url": "https://bugzilla.suse.com/1174955"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15708"
},
{
"cve": "CVE-2020-25637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25637"
}
],
"notes": [
{
"category": "general",
"text": "A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25637",
"url": "https://www.suse.com/security/cve/CVE-2020-25637"
},
{
"category": "external",
"summary": "SUSE Bug 1174955 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1174955"
},
{
"category": "external",
"summary": "SUSE Bug 1177155 for CVE-2020-25637",
"url": "https://bugzilla.suse.com/1177155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25637"
},
{
"cve": "CVE-2021-3631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3631"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs\u0027 dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3631",
"url": "https://www.suse.com/security/cve/CVE-2021-3631"
},
{
"category": "external",
"summary": "SUSE Bug 1187871 for CVE-2021-3631",
"url": "https://bugzilla.suse.com/1187871"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3631"
},
{
"cve": "CVE-2021-3667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3667"
}
],
"notes": [
{
"category": "general",
"text": "An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3667",
"url": "https://www.suse.com/security/cve/CVE-2021-3667"
},
{
"category": "external",
"summary": "SUSE Bug 1188843 for CVE-2021-3667",
"url": "https://bugzilla.suse.com/1188843"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-client-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-config-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-interface-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-libxl-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-network-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nodedev-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-nwfilter-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-secret-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-core-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-disk-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-gluster-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-iscsi-direct-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-logical-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-mpath-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-rbd-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-driver-storage-scsi-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-hooks-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-lxc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-qemu-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-daemon-xen-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-32bit-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-devel-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-doc-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-libs-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-lock-sanlock-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:libvirt-nss-7.7.0-2.1.x86_64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.aarch64",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.ppc64le",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.s390x",
"openSUSE Tumbleweed:wireshark-plugin-libvirt-7.7.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3667"
}
]
}
OPENSUSE-SU-2024:11520-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "xen-4.15.1_01-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the xen-4.15.1_01-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11520",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11520-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1320 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-1366 page",
"url": "https://www.suse.com/security/cve/CVE-2007-1366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2007-3919 page",
"url": "https://www.suse.com/security/cve/CVE-2007-3919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10013 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10024 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10025 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7777 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7908 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8667 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8669 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8910 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9377 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9379 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9382 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9383 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9384 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9385 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9386 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9637 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9932 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9932/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12135 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12136 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12137 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12137/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6505 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8309 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9330 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9330/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10471 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10471/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10472 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10981 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10982 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12891 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12892 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12892/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12893 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15468 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15468/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15469 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15470 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15470/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-18883 page",
"url": "https://www.suse.com/security/cve/CVE-2018-18883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19961 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19963 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19964 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19965 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19966 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19967 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19967/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3665 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3665/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5244 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7540 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7541 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7542 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8897 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17349 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0543 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11739 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15563 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15565 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15566 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15567 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25595 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25596 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25597 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25598 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25599 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25600 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25601 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25602 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25603 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25604 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27670 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27671 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27672 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27672/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27674 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28368 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29040 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29040/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29480 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29481 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29481/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29483 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29484 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29566 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29567 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29570 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29570/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29571 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-28687 page",
"url": "https://www.suse.com/security/cve/CVE-2021-28687/"
}
],
"title": "xen-4.15.1_01-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11520-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-4.15.1_01-1.2.aarch64",
"product_id": "xen-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-devel-4.15.1_01-1.2.aarch64",
"product_id": "xen-devel-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-doc-html-4.15.1_01-1.2.aarch64",
"product_id": "xen-doc-html-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-libs-4.15.1_01-1.2.aarch64",
"product_id": "xen-libs-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-libs-32bit-4.15.1_01-1.2.aarch64",
"product_id": "xen-libs-32bit-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-tools-4.15.1_01-1.2.aarch64",
"product_id": "xen-tools-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-tools-domU-4.15.1_01-1.2.aarch64",
"product_id": "xen-tools-domU-4.15.1_01-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-4.15.1_01-1.2.ppc64le",
"product_id": "xen-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-devel-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-devel-4.15.1_01-1.2.ppc64le",
"product_id": "xen-devel-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-doc-html-4.15.1_01-1.2.ppc64le",
"product_id": "xen-doc-html-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-libs-4.15.1_01-1.2.ppc64le",
"product_id": "xen-libs-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"product_id": "xen-libs-32bit-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-tools-4.15.1_01-1.2.ppc64le",
"product_id": "xen-tools-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-tools-domU-4.15.1_01-1.2.ppc64le",
"product_id": "xen-tools-domU-4.15.1_01-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-4.15.1_01-1.2.s390x",
"product_id": "xen-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-devel-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-devel-4.15.1_01-1.2.s390x",
"product_id": "xen-devel-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-doc-html-4.15.1_01-1.2.s390x",
"product_id": "xen-doc-html-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-libs-4.15.1_01-1.2.s390x",
"product_id": "xen-libs-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-libs-32bit-4.15.1_01-1.2.s390x",
"product_id": "xen-libs-32bit-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-tools-4.15.1_01-1.2.s390x",
"product_id": "xen-tools-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-tools-domU-4.15.1_01-1.2.s390x",
"product_id": "xen-tools-domU-4.15.1_01-1.2.s390x"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-4.15.1_01-1.2.x86_64",
"product_id": "xen-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-devel-4.15.1_01-1.2.x86_64",
"product_id": "xen-devel-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-doc-html-4.15.1_01-1.2.x86_64",
"product_id": "xen-doc-html-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-libs-4.15.1_01-1.2.x86_64",
"product_id": "xen-libs-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.15.1_01-1.2.x86_64",
"product_id": "xen-libs-32bit-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-tools-4.15.1_01-1.2.x86_64",
"product_id": "xen-tools-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-tools-domU-4.15.1_01-1.2.x86_64",
"product_id": "xen-tools-domU-4.15.1_01-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64",
"product": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64",
"product_id": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-devel-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-devel-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-devel-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-devel-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-doc-html-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-doc-html-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-doc-html-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-doc-html-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-libs-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-libs-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-libs-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-libs-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-libs-32bit-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-libs-32bit-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-tools-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-tools-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-tools-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-tools-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-tools-domU-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-tools-domU-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-tools-domU-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-tools-domU-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
},
"product_reference": "xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1320"
}
],
"notes": [
{
"category": "general",
"text": "Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to \"attempting to mark non-existent regions as dirty,\" aka the \"bitblt\" heap overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1320",
"url": "https://www.suse.com/security/cve/CVE-2007-1320"
},
{
"category": "external",
"summary": "SUSE Bug 252519 for CVE-2007-1320",
"url": "https://bugzilla.suse.com/252519"
},
{
"category": "external",
"summary": "SUSE Bug 270621 for CVE-2007-1320",
"url": "https://bugzilla.suse.com/270621"
},
{
"category": "external",
"summary": "SUSE Bug 435135 for CVE-2007-1320",
"url": "https://bugzilla.suse.com/435135"
},
{
"category": "external",
"summary": "SUSE Bug 448551 for CVE-2007-1320",
"url": "https://bugzilla.suse.com/448551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2007-1320"
},
{
"cve": "CVE-2007-1366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-1366"
}
],
"notes": [
{
"category": "general",
"text": "QEMU 0.8.2 allows local users to crash a virtual machine via the divisor operand to the aam instruction, as demonstrated by \"aam 0x0,\" which triggers a divide-by-zero error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-1366",
"url": "https://www.suse.com/security/cve/CVE-2007-1366"
},
{
"category": "external",
"summary": "SUSE Bug 252519 for CVE-2007-1366",
"url": "https://bugzilla.suse.com/252519"
},
{
"category": "external",
"summary": "SUSE Bug 270621 for CVE-2007-1366",
"url": "https://bugzilla.suse.com/270621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2007-1366"
},
{
"cve": "CVE-2007-3919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2007-3919"
}
],
"notes": [
{
"category": "general",
"text": "(1) xenbaked and (2) xenmon.py in Xen 3.1 and earlier allow local users to truncate arbitrary files via a symlink attack on /tmp/xenq-shm.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2007-3919",
"url": "https://www.suse.com/security/cve/CVE-2007-3919"
},
{
"category": "external",
"summary": "SUSE Bug 334445 for CVE-2007-3919",
"url": "https://bugzilla.suse.com/334445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2007-3919"
},
{
"cve": "CVE-2016-10013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10013"
}
],
"notes": [
{
"category": "general",
"text": "Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10013",
"url": "https://www.suse.com/security/cve/CVE-2016-10013"
},
{
"category": "external",
"summary": "SUSE Bug 1016340 for CVE-2016-10013",
"url": "https://bugzilla.suse.com/1016340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10013"
},
{
"cve": "CVE-2016-10024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10024"
}
],
"notes": [
{
"category": "general",
"text": "Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10024",
"url": "https://www.suse.com/security/cve/CVE-2016-10024"
},
{
"category": "external",
"summary": "SUSE Bug 1014298 for CVE-2016-10024",
"url": "https://bugzilla.suse.com/1014298"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-10024",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10024"
},
{
"cve": "CVE-2016-10025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10025"
}
],
"notes": [
{
"category": "general",
"text": "VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10025",
"url": "https://www.suse.com/security/cve/CVE-2016-10025"
},
{
"category": "external",
"summary": "SUSE Bug 1014300 for CVE-2016-10025",
"url": "https://bugzilla.suse.com/1014300"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10025"
},
{
"cve": "CVE-2016-7777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7777"
}
],
"notes": [
{
"category": "general",
"text": "Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7777",
"url": "https://www.suse.com/security/cve/CVE-2016-7777"
},
{
"category": "external",
"summary": "SUSE Bug 1000106 for CVE-2016-7777",
"url": "https://bugzilla.suse.com/1000106"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7777"
},
{
"cve": "CVE-2016-7908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7908"
}
],
"notes": [
{
"category": "general",
"text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7908",
"url": "https://www.suse.com/security/cve/CVE-2016-7908"
},
{
"category": "external",
"summary": "SUSE Bug 1002550 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1002550"
},
{
"category": "external",
"summary": "SUSE Bug 1003030 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1003030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7908"
},
{
"cve": "CVE-2016-7909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7909"
}
],
"notes": [
{
"category": "general",
"text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7909",
"url": "https://www.suse.com/security/cve/CVE-2016-7909"
},
{
"category": "external",
"summary": "SUSE Bug 1002557 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1002557"
},
{
"category": "external",
"summary": "SUSE Bug 1003032 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1003032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7909"
},
{
"cve": "CVE-2016-8667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8667"
}
],
"notes": [
{
"category": "general",
"text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8667",
"url": "https://www.suse.com/security/cve/CVE-2016-8667"
},
{
"category": "external",
"summary": "SUSE Bug 1004702 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1004702"
},
{
"category": "external",
"summary": "SUSE Bug 1005004 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1005004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8667"
},
{
"cve": "CVE-2016-8669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8669"
}
],
"notes": [
{
"category": "general",
"text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8669",
"url": "https://www.suse.com/security/cve/CVE-2016-8669"
},
{
"category": "external",
"summary": "SUSE Bug 1004707 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1004707"
},
{
"category": "external",
"summary": "SUSE Bug 1005005 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1005005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8669"
},
{
"cve": "CVE-2016-8910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8910"
}
],
"notes": [
{
"category": "general",
"text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8910",
"url": "https://www.suse.com/security/cve/CVE-2016-8910"
},
{
"category": "external",
"summary": "SUSE Bug 1006538 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1006538"
},
{
"category": "external",
"summary": "SUSE Bug 1007157 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1007157"
},
{
"category": "external",
"summary": "SUSE Bug 1024178 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1024178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8910"
},
{
"cve": "CVE-2016-9377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9377"
}
],
"notes": [
{
"category": "general",
"text": "Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9377",
"url": "https://www.suse.com/security/cve/CVE-2016-9377"
},
{
"category": "external",
"summary": "SUSE Bug 1009108 for CVE-2016-9377",
"url": "https://bugzilla.suse.com/1009108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9377"
},
{
"cve": "CVE-2016-9379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9379"
}
],
"notes": [
{
"category": "general",
"text": "The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9379",
"url": "https://www.suse.com/security/cve/CVE-2016-9379"
},
{
"category": "external",
"summary": "SUSE Bug 1009111 for CVE-2016-9379",
"url": "https://bugzilla.suse.com/1009111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9379"
},
{
"cve": "CVE-2016-9381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9381"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9381",
"url": "https://www.suse.com/security/cve/CVE-2016-9381"
},
{
"category": "external",
"summary": "SUSE Bug 1009109 for CVE-2016-9381",
"url": "https://bugzilla.suse.com/1009109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-9381"
},
{
"cve": "CVE-2016-9382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9382"
}
],
"notes": [
{
"category": "general",
"text": "Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9382",
"url": "https://www.suse.com/security/cve/CVE-2016-9382"
},
{
"category": "external",
"summary": "SUSE Bug 1009103 for CVE-2016-9382",
"url": "https://bugzilla.suse.com/1009103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9382"
},
{
"cve": "CVE-2016-9383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9383"
}
],
"notes": [
{
"category": "general",
"text": "Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9383",
"url": "https://www.suse.com/security/cve/CVE-2016-9383"
},
{
"category": "external",
"summary": "SUSE Bug 1009107 for CVE-2016-9383",
"url": "https://bugzilla.suse.com/1009107"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9383"
},
{
"cve": "CVE-2016-9384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9384"
}
],
"notes": [
{
"category": "general",
"text": "Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9384",
"url": "https://www.suse.com/security/cve/CVE-2016-9384"
},
{
"category": "external",
"summary": "SUSE Bug 1009105 for CVE-2016-9384",
"url": "https://bugzilla.suse.com/1009105"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9384"
},
{
"cve": "CVE-2016-9385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9385"
}
],
"notes": [
{
"category": "general",
"text": "The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9385",
"url": "https://www.suse.com/security/cve/CVE-2016-9385"
},
{
"category": "external",
"summary": "SUSE Bug 1009104 for CVE-2016-9385",
"url": "https://bugzilla.suse.com/1009104"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9385"
},
{
"cve": "CVE-2016-9386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9386"
}
],
"notes": [
{
"category": "general",
"text": "The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving \"unexpected\" base/limit values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9386",
"url": "https://www.suse.com/security/cve/CVE-2016-9386"
},
{
"category": "external",
"summary": "SUSE Bug 1009100 for CVE-2016-9386",
"url": "https://bugzilla.suse.com/1009100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9386"
},
{
"cve": "CVE-2016-9637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9637"
}
],
"notes": [
{
"category": "general",
"text": "The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9637",
"url": "https://www.suse.com/security/cve/CVE-2016-9637"
},
{
"category": "external",
"summary": "SUSE Bug 1011652 for CVE-2016-9637",
"url": "https://bugzilla.suse.com/1011652"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9637"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2016-9932",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9932"
}
],
"notes": [
{
"category": "general",
"text": "CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a \"supposedly-ignored\" operand size prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9932",
"url": "https://www.suse.com/security/cve/CVE-2016-9932"
},
{
"category": "external",
"summary": "SUSE Bug 1012651 for CVE-2016-9932",
"url": "https://bugzilla.suse.com/1012651"
},
{
"category": "external",
"summary": "SUSE Bug 1016340 for CVE-2016-9932",
"url": "https://bugzilla.suse.com/1016340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9932"
},
{
"cve": "CVE-2017-12135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12135"
}
],
"notes": [
{
"category": "general",
"text": "Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12135",
"url": "https://www.suse.com/security/cve/CVE-2017-12135"
},
{
"category": "external",
"summary": "SUSE Bug 1051787 for CVE-2017-12135",
"url": "https://bugzilla.suse.com/1051787"
},
{
"category": "external",
"summary": "SUSE Bug 1169392 for CVE-2017-12135",
"url": "https://bugzilla.suse.com/1169392"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-12135",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-12135"
},
{
"cve": "CVE-2017-12136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12136"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12136",
"url": "https://www.suse.com/security/cve/CVE-2017-12136"
},
{
"category": "external",
"summary": "SUSE Bug 1051789 for CVE-2017-12136",
"url": "https://bugzilla.suse.com/1051789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-12136"
},
{
"cve": "CVE-2017-12137",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12137"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12137",
"url": "https://www.suse.com/security/cve/CVE-2017-12137"
},
{
"category": "external",
"summary": "SUSE Bug 1051788 for CVE-2017-12137",
"url": "https://bugzilla.suse.com/1051788"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-12137",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-12137"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-6505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6505"
}
],
"notes": [
{
"category": "general",
"text": "The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6505",
"url": "https://www.suse.com/security/cve/CVE-2017-6505"
},
{
"category": "external",
"summary": "SUSE Bug 1028184 for CVE-2017-6505",
"url": "https://bugzilla.suse.com/1028184"
},
{
"category": "external",
"summary": "SUSE Bug 1028235 for CVE-2017-6505",
"url": "https://bugzilla.suse.com/1028235"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-6505",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6505"
},
{
"cve": "CVE-2017-8309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8309"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8309",
"url": "https://www.suse.com/security/cve/CVE-2017-8309"
},
{
"category": "external",
"summary": "SUSE Bug 1037242 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037242"
},
{
"category": "external",
"summary": "SUSE Bug 1037243 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037243"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8309"
},
{
"cve": "CVE-2017-9330",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9330"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9330",
"url": "https://www.suse.com/security/cve/CVE-2017-9330"
},
{
"category": "external",
"summary": "SUSE Bug 1042159 for CVE-2017-9330",
"url": "https://bugzilla.suse.com/1042159"
},
{
"category": "external",
"summary": "SUSE Bug 1042160 for CVE-2017-9330",
"url": "https://bugzilla.suse.com/1042160"
},
{
"category": "external",
"summary": "SUSE Bug 1043157 for CVE-2017-9330",
"url": "https://bugzilla.suse.com/1043157"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-9330",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9330"
},
{
"cve": "CVE-2018-10471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10471"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10471",
"url": "https://www.suse.com/security/cve/CVE-2018-10471"
},
{
"category": "external",
"summary": "SUSE Bug 1089635 for CVE-2018-10471",
"url": "https://bugzilla.suse.com/1089635"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10471",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10471"
},
{
"cve": "CVE-2018-10472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10472"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10472",
"url": "https://www.suse.com/security/cve/CVE-2018-10472"
},
{
"category": "external",
"summary": "SUSE Bug 1089152 for CVE-2018-10472",
"url": "https://bugzilla.suse.com/1089152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10472"
},
{
"cve": "CVE-2018-10981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10981"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10981",
"url": "https://www.suse.com/security/cve/CVE-2018-10981"
},
{
"category": "external",
"summary": "SUSE Bug 1090823 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10981"
},
{
"cve": "CVE-2018-10982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10982"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10982",
"url": "https://www.suse.com/security/cve/CVE-2018-10982"
},
{
"category": "external",
"summary": "SUSE Bug 1090822 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-10982"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12891"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12891",
"url": "https://www.suse.com/security/cve/CVE-2018-12891"
},
{
"category": "external",
"summary": "SUSE Bug 1097521 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1097521"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12891"
},
{
"cve": "CVE-2018-12892",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12892"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as \"sd\" in the libxl disk configuration, or an equivalent) are affected. IDE disks (\"hd\") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12892",
"url": "https://www.suse.com/security/cve/CVE-2018-12892"
},
{
"category": "external",
"summary": "SUSE Bug 1097523 for CVE-2018-12892",
"url": "https://bugzilla.suse.com/1097523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12892"
},
{
"cve": "CVE-2018-12893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12893"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12893",
"url": "https://www.suse.com/security/cve/CVE-2018-12893"
},
{
"category": "external",
"summary": "SUSE Bug 1097522 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1097522"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-12893"
},
{
"cve": "CVE-2018-15468",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15468"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15468",
"url": "https://www.suse.com/security/cve/CVE-2018-15468"
},
{
"category": "external",
"summary": "SUSE Bug 1103276 for CVE-2018-15468",
"url": "https://bugzilla.suse.com/1103276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15468"
},
{
"cve": "CVE-2018-15469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15469"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15469",
"url": "https://www.suse.com/security/cve/CVE-2018-15469"
},
{
"category": "external",
"summary": "SUSE Bug 1103275 for CVE-2018-15469",
"url": "https://bugzilla.suse.com/1103275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15469"
},
{
"cve": "CVE-2018-15470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15470"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 \"Operations on data structures\" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15470",
"url": "https://www.suse.com/security/cve/CVE-2018-15470"
},
{
"category": "external",
"summary": "SUSE Bug 1103279 for CVE-2018-15470",
"url": "https://bugzilla.suse.com/1103279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15470"
},
{
"cve": "CVE-2018-18883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-18883"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-18883",
"url": "https://www.suse.com/security/cve/CVE-2018-18883"
},
{
"category": "external",
"summary": "SUSE Bug 1114405 for CVE-2018-18883",
"url": "https://bugzilla.suse.com/1114405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-18883"
},
{
"cve": "CVE-2018-19961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19961"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19961",
"url": "https://www.suse.com/security/cve/CVE-2018-19961"
},
{
"category": "external",
"summary": "SUSE Bug 1115040 for CVE-2018-19961",
"url": "https://bugzilla.suse.com/1115040"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-19961",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-19961"
},
{
"cve": "CVE-2018-19963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19963"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19963",
"url": "https://www.suse.com/security/cve/CVE-2018-19963"
},
{
"category": "external",
"summary": "SUSE Bug 1115043 for CVE-2018-19963",
"url": "https://bugzilla.suse.com/1115043"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-19963"
},
{
"cve": "CVE-2018-19964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19964"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19964",
"url": "https://www.suse.com/security/cve/CVE-2018-19964"
},
{
"category": "external",
"summary": "SUSE Bug 1115044 for CVE-2018-19964",
"url": "https://bugzilla.suse.com/1115044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19964"
},
{
"cve": "CVE-2018-19965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19965"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19965",
"url": "https://www.suse.com/security/cve/CVE-2018-19965"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2018-19965",
"url": "https://bugzilla.suse.com/1115045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19965"
},
{
"cve": "CVE-2018-19966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19966"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19966",
"url": "https://www.suse.com/security/cve/CVE-2018-19966"
},
{
"category": "external",
"summary": "SUSE Bug 1115047 for CVE-2018-19966",
"url": "https://bugzilla.suse.com/1115047"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-19966",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19966"
},
{
"cve": "CVE-2018-19967",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19967"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel\u0027s mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19967",
"url": "https://www.suse.com/security/cve/CVE-2018-19967"
},
{
"category": "external",
"summary": "SUSE Bug 1114988 for CVE-2018-19967",
"url": "https://bugzilla.suse.com/1114988"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-19967",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-19967"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
},
{
"cve": "CVE-2018-3665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3665"
}
],
"notes": [
{
"category": "general",
"text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3665",
"url": "https://www.suse.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087086 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "external",
"summary": "SUSE Bug 1090338 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1090338"
},
{
"category": "external",
"summary": "SUSE Bug 1095241 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095241"
},
{
"category": "external",
"summary": "SUSE Bug 1095242 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "external",
"summary": "SUSE Bug 1096740 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1096740"
},
{
"category": "external",
"summary": "SUSE Bug 1100091 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100091"
},
{
"category": "external",
"summary": "SUSE Bug 1100555 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100555"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3665"
},
{
"cve": "CVE-2018-5244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5244"
}
],
"notes": [
{
"category": "general",
"text": "In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn\u0027t freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5244",
"url": "https://www.suse.com/security/cve/CVE-2018-5244"
},
{
"category": "external",
"summary": "SUSE Bug 1073961 for CVE-2018-5244",
"url": "https://bugzilla.suse.com/1073961"
},
{
"category": "external",
"summary": "SUSE Bug 1074966 for CVE-2018-5244",
"url": "https://bugzilla.suse.com/1074966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-5244"
},
{
"cve": "CVE-2018-7540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7540"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7540",
"url": "https://www.suse.com/security/cve/CVE-2018-7540"
},
{
"category": "external",
"summary": "SUSE Bug 1080635 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1080635"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7540",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7540"
},
{
"cve": "CVE-2018-7541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7541"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7541",
"url": "https://www.suse.com/security/cve/CVE-2018-7541"
},
{
"category": "external",
"summary": "SUSE Bug 1080662 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1080662"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-7541",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-7541"
},
{
"cve": "CVE-2018-7542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7542"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7542",
"url": "https://www.suse.com/security/cve/CVE-2018-7542"
},
{
"category": "external",
"summary": "SUSE Bug 1080634 for CVE-2018-7542",
"url": "https://bugzilla.suse.com/1080634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-7542"
},
{
"cve": "CVE-2018-8897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8897"
}
],
"notes": [
{
"category": "general",
"text": "A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer\u0027s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL \u003c 3, the debug exception is delivered after the transfer to CPL \u003c 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8897",
"url": "https://www.suse.com/security/cve/CVE-2018-8897"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087088 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1087088"
},
{
"category": "external",
"summary": "SUSE Bug 1090368 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1090368"
},
{
"category": "external",
"summary": "SUSE Bug 1090820 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1090820"
},
{
"category": "external",
"summary": "SUSE Bug 1090869 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1090869"
},
{
"category": "external",
"summary": "SUSE Bug 1092497 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "external",
"summary": "SUSE Bug 1093522 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1093522"
},
{
"category": "external",
"summary": "SUSE Bug 1093524 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1093524"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100835 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1100835"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-8897",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-8897"
},
{
"cve": "CVE-2019-17349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17349"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17349",
"url": "https://www.suse.com/security/cve/CVE-2019-17349"
},
{
"category": "external",
"summary": "SUSE Bug 1138294 for CVE-2019-17349",
"url": "https://bugzilla.suse.com/1138294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17349"
},
{
"cve": "CVE-2020-0543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0543"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0543",
"url": "https://www.suse.com/security/cve/CVE-2020-0543"
},
{
"category": "external",
"summary": "SUSE Bug 1154824 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1154824"
},
{
"category": "external",
"summary": "SUSE Bug 1172205 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172205"
},
{
"category": "external",
"summary": "SUSE Bug 1172206 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172206"
},
{
"category": "external",
"summary": "SUSE Bug 1172207 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172207"
},
{
"category": "external",
"summary": "SUSE Bug 1172770 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1172770"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2020-0543",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-0543"
},
{
"cve": "CVE-2020-11739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11739"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don\u0027t contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the \"critical\" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11739",
"url": "https://www.suse.com/security/cve/CVE-2020-11739"
},
{
"category": "external",
"summary": "SUSE Bug 1168142 for CVE-2020-11739",
"url": "https://bugzilla.suse.com/1168142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-11739"
},
{
"cve": "CVE-2020-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11740"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11740",
"url": "https://www.suse.com/security/cve/CVE-2020-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1168140 for CVE-2020-11740",
"url": "https://bugzilla.suse.com/1168140"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-11740",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-11740"
},
{
"cve": "CVE-2020-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11742"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11742",
"url": "https://www.suse.com/security/cve/CVE-2020-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1169392 for CVE-2020-11742",
"url": "https://bugzilla.suse.com/1169392"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-11742",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-11742"
},
{
"cve": "CVE-2020-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11743"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11743",
"url": "https://www.suse.com/security/cve/CVE-2020-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1168143 for CVE-2020-11743",
"url": "https://bugzilla.suse.com/1168143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-11743"
},
{
"cve": "CVE-2020-15563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15563"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests\u0027 dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest\u0027s video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15563",
"url": "https://www.suse.com/security/cve/CVE-2020-15563"
},
{
"category": "external",
"summary": "SUSE Bug 1173377 for CVE-2020-15563",
"url": "https://bugzilla.suse.com/1173377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-15563"
},
{
"cve": "CVE-2020-15565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15565"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen\u0027s free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15565",
"url": "https://www.suse.com/security/cve/CVE-2020-15565"
},
{
"category": "external",
"summary": "SUSE Bug 1173378 for CVE-2020-15565",
"url": "https://bugzilla.suse.com/1173378"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15565"
},
{
"cve": "CVE-2020-15566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15566",
"url": "https://www.suse.com/security/cve/CVE-2020-15566"
},
{
"category": "external",
"summary": "SUSE Bug 1173376 for CVE-2020-15566",
"url": "https://bugzilla.suse.com/1173376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-15566"
},
{
"cve": "CVE-2020-15567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15567"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15567",
"url": "https://www.suse.com/security/cve/CVE-2020-15567"
},
{
"category": "external",
"summary": "SUSE Bug 1173380 for CVE-2020-15567",
"url": "https://bugzilla.suse.com/1173380"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-15567",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-15567"
},
{
"cve": "CVE-2020-25595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen\u0027s MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn\u0027t be able to affect these registers, experience shows that it\u0027s very common for devices to have out-of-spec \"backdoor\" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec (\"backdoor\") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it\u0027s better to assume that it does.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25595",
"url": "https://www.suse.com/security/cve/CVE-2020-25595"
},
{
"category": "external",
"summary": "SUSE Bug 1176344 for CVE-2020-25595",
"url": "https://bugzilla.suse.com/1176344"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-25595",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25595"
},
{
"cve": "CVE-2020-25596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25596"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen\u0027s sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25596",
"url": "https://www.suse.com/security/cve/CVE-2020-25596"
},
{
"category": "external",
"summary": "SUSE Bug 1176345 for CVE-2020-25596",
"url": "https://bugzilla.suse.com/1176345"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-25596",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25596"
},
{
"cve": "CVE-2020-25597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25597"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25597",
"url": "https://www.suse.com/security/cve/CVE-2020-25597"
},
{
"category": "external",
"summary": "SUSE Bug 1176346 for CVE-2020-25597",
"url": "https://bugzilla.suse.com/1176346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25597"
},
{
"cve": "CVE-2020-25598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25598"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don\u0027t use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25598",
"url": "https://www.suse.com/security/cve/CVE-2020-25598"
},
{
"category": "external",
"summary": "SUSE Bug 1176341 for CVE-2020-25598",
"url": "https://bugzilla.suse.com/1176341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25598"
},
{
"cve": "CVE-2020-25599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25599"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25599",
"url": "https://www.suse.com/security/cve/CVE-2020-25599"
},
{
"category": "external",
"summary": "SUSE Bug 1176349 for CVE-2020-25599",
"url": "https://bugzilla.suse.com/1176349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25599"
},
{
"cve": "CVE-2020-25600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25600"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn\u0027t get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25600",
"url": "https://www.suse.com/security/cve/CVE-2020-25600"
},
{
"category": "external",
"summary": "SUSE Bug 1176348 for CVE-2020-25600",
"url": "https://bugzilla.suse.com/1176348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25600"
},
{
"cve": "CVE-2020-25601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25601"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25601",
"url": "https://www.suse.com/security/cve/CVE-2020-25601"
},
{
"category": "external",
"summary": "SUSE Bug 1176350 for CVE-2020-25601",
"url": "https://bugzilla.suse.com/1176350"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25601"
},
{
"cve": "CVE-2020-25602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25602"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25602",
"url": "https://www.suse.com/security/cve/CVE-2020-25602"
},
{
"category": "external",
"summary": "SUSE Bug 1176339 for CVE-2020-25602",
"url": "https://bugzilla.suse.com/1176339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25602"
},
{
"cve": "CVE-2020-25603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25603"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25603",
"url": "https://www.suse.com/security/cve/CVE-2020-25603"
},
{
"category": "external",
"summary": "SUSE Bug 1176347 for CVE-2020-25603",
"url": "https://bugzilla.suse.com/1176347"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-25603",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25603"
},
{
"cve": "CVE-2020-25604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25604"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn\u0027t acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25604",
"url": "https://www.suse.com/security/cve/CVE-2020-25604"
},
{
"category": "external",
"summary": "SUSE Bug 1176343 for CVE-2020-25604",
"url": "https://bugzilla.suse.com/1176343"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-25604",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25604"
},
{
"cve": "CVE-2020-27670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27670"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27670",
"url": "https://www.suse.com/security/cve/CVE-2020-27670"
},
{
"category": "external",
"summary": "SUSE Bug 1177414 for CVE-2020-27670",
"url": "https://bugzilla.suse.com/1177414"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-27670",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1183925 for CVE-2020-27670",
"url": "https://bugzilla.suse.com/1183925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-27670"
},
{
"cve": "CVE-2020-27671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27671"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27671",
"url": "https://www.suse.com/security/cve/CVE-2020-27671"
},
{
"category": "external",
"summary": "SUSE Bug 1177413 for CVE-2020-27671",
"url": "https://bugzilla.suse.com/1177413"
},
{
"category": "external",
"summary": "SUSE Bug 1183925 for CVE-2020-27671",
"url": "https://bugzilla.suse.com/1183925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-27671"
},
{
"cve": "CVE-2020-27672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27672"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27672",
"url": "https://www.suse.com/security/cve/CVE-2020-27672"
},
{
"category": "external",
"summary": "SUSE Bug 1177412 for CVE-2020-27672",
"url": "https://bugzilla.suse.com/1177412"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-27672",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1183925 for CVE-2020-27672",
"url": "https://bugzilla.suse.com/1183925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-27672"
},
{
"cve": "CVE-2020-27674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27674"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27674",
"url": "https://www.suse.com/security/cve/CVE-2020-27674"
},
{
"category": "external",
"summary": "SUSE Bug 1177409 for CVE-2020-27674",
"url": "https://bugzilla.suse.com/1177409"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-27674",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-27674"
},
{
"cve": "CVE-2020-28368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28368"
}
],
"notes": [
{
"category": "general",
"text": "Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a \"Platypus\" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28368",
"url": "https://www.suse.com/security/cve/CVE-2020-28368"
},
{
"category": "external",
"summary": "SUSE Bug 1178591 for CVE-2020-28368",
"url": "https://bugzilla.suse.com/1178591"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-28368",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-28368"
},
{
"cve": "CVE-2020-29040",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29040"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x allowing x86 HVM guest OS users to cause a denial of service (stack corruption), cause a data leak, or possibly gain privileges because of an off-by-one error. NOTE: this issue is caused by an incorrect fix for CVE-2020-27671.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29040",
"url": "https://www.suse.com/security/cve/CVE-2020-29040"
},
{
"category": "external",
"summary": "SUSE Bug 1178963 for CVE-2020-29040",
"url": "https://bugzilla.suse.com/1178963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29040"
},
{
"cve": "CVE-2020-29480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29480"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests\u0027 devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29480",
"url": "https://www.suse.com/security/cve/CVE-2020-29480"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-29480",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1179496 for CVE-2020-29480",
"url": "https://bugzilla.suse.com/1179496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-29480"
},
{
"cve": "CVE-2020-29481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29481"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/\u003cdomid\u003e are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29481",
"url": "https://www.suse.com/security/cve/CVE-2020-29481"
},
{
"category": "external",
"summary": "SUSE Bug 1176349 for CVE-2020-29481",
"url": "https://bugzilla.suse.com/1176349"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-29481",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1179498 for CVE-2020-29481",
"url": "https://bugzilla.suse.com/1179498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29481"
},
{
"cve": "CVE-2020-29483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29483"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored\u0027s internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest\u0027s memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29483",
"url": "https://www.suse.com/security/cve/CVE-2020-29483"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-29483",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1179502 for CVE-2020-29483",
"url": "https://bugzilla.suse.com/1179502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29483"
},
{
"cve": "CVE-2020-29484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29484"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29484",
"url": "https://www.suse.com/security/cve/CVE-2020-29484"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-29484",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1179501 for CVE-2020-29484",
"url": "https://bugzilla.suse.com/1179501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29484"
},
{
"cve": "CVE-2020-29566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29566"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29566",
"url": "https://www.suse.com/security/cve/CVE-2020-29566"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-29566",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1179506 for CVE-2020-29566",
"url": "https://bugzilla.suse.com/1179506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29566"
},
{
"cve": "CVE-2020-29567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29567"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29567",
"url": "https://www.suse.com/security/cve/CVE-2020-29567"
},
{
"category": "external",
"summary": "SUSE Bug 1179513 for CVE-2020-29567",
"url": "https://bugzilla.suse.com/1179513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29567"
},
{
"cve": "CVE-2020-29570",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29570"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29570",
"url": "https://www.suse.com/security/cve/CVE-2020-29570"
},
{
"category": "external",
"summary": "SUSE Bug 1179514 for CVE-2020-29570",
"url": "https://bugzilla.suse.com/1179514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29570"
},
{
"cve": "CVE-2020-29571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29571"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn\u0027t protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29571",
"url": "https://www.suse.com/security/cve/CVE-2020-29571"
},
{
"category": "external",
"summary": "SUSE Bug 1179516 for CVE-2020-29571",
"url": "https://bugzilla.suse.com/1179516"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29571"
},
{
"cve": "CVE-2021-28687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-28687"
}
],
"notes": [
{
"category": "general",
"text": "HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the \"soft reset\" feature was implemented, the libxl__domain_suspend_state structure didn\u0027t require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the \"soft reset\" path wasn\u0027t refactored to call the initialization function. When a guest nwo initiates a \"soft reboot\", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes \"leak\" resources, then repeated crashes could use up resources, also causing a system-wide DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-28687",
"url": "https://www.suse.com/security/cve/CVE-2021-28687"
},
{
"category": "external",
"summary": "SUSE Bug 1183072 for CVE-2021-28687",
"url": "https://bugzilla.suse.com/1183072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-devel-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-doc-html-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-32bit-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-libs-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-domU-4.15.1_01-1.2.x86_64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.aarch64",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.ppc64le",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.s390x",
"openSUSE Tumbleweed:xen-tools-xendomains-wait-disk-4.15.1_01-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-28687"
}
]
}
OPENSUSE-SU-2020:1325-1
Vulnerability from csaf_opensuse - Published: 2020-09-02 14:23 - Updated: 2020-09-02 14:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1085308 bnc#1087082 bnc#1172782 bnc#1172783). Mitigations for Arm had not been included yet.\n- CVE-2020-14314: Fixed potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n- CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system (bnc#1175213).\n- CVE-2020-1749: Some ipv6 protocols were not encrypted over ipsec tunnels (bsc#1165629).\n- CVE-2020-24394: fs/nfsd/vfs.c (in the NFS server) could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered (bnc#1175518).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547)\n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n- arm64: Always enable ssb vulnerability detection (bsc#1174547).\n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547).\n- arm64: ssbd: explicitly depend on \u0026lt;linux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: \u0026lt;uapi/asm/ptrace.h\u003e should not depend on \u0026lt;uapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5: Delete extra dump stack that gives nothing (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- usb: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- usb: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1325",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1325-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1325-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1325-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1083548",
"url": "https://bugzilla.suse.com/1083548"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1144333",
"url": "https://bugzilla.suse.com/1144333"
},
{
"category": "self",
"summary": "SUSE Bug 1152148",
"url": "https://bugzilla.suse.com/1152148"
},
{
"category": "self",
"summary": "SUSE Bug 1163524",
"url": "https://bugzilla.suse.com/1163524"
},
{
"category": "self",
"summary": "SUSE Bug 1165629",
"url": "https://bugzilla.suse.com/1165629"
},
{
"category": "self",
"summary": "SUSE Bug 1166965",
"url": "https://bugzilla.suse.com/1166965"
},
{
"category": "self",
"summary": "SUSE Bug 1169790",
"url": "https://bugzilla.suse.com/1169790"
},
{
"category": "self",
"summary": "SUSE Bug 1170232",
"url": "https://bugzilla.suse.com/1170232"
},
{
"category": "self",
"summary": "SUSE Bug 1171688",
"url": "https://bugzilla.suse.com/1171688"
},
{
"category": "self",
"summary": "SUSE Bug 1172073",
"url": "https://bugzilla.suse.com/1172073"
},
{
"category": "self",
"summary": "SUSE Bug 1172108",
"url": "https://bugzilla.suse.com/1172108"
},
{
"category": "self",
"summary": "SUSE Bug 1172418",
"url": "https://bugzilla.suse.com/1172418"
},
{
"category": "self",
"summary": "SUSE Bug 1172428",
"url": "https://bugzilla.suse.com/1172428"
},
{
"category": "self",
"summary": "SUSE Bug 1172783",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "self",
"summary": "SUSE Bug 1172871",
"url": "https://bugzilla.suse.com/1172871"
},
{
"category": "self",
"summary": "SUSE Bug 1172872",
"url": "https://bugzilla.suse.com/1172872"
},
{
"category": "self",
"summary": "SUSE Bug 1172873",
"url": "https://bugzilla.suse.com/1172873"
},
{
"category": "self",
"summary": "SUSE Bug 1172963",
"url": "https://bugzilla.suse.com/1172963"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1173798",
"url": "https://bugzilla.suse.com/1173798"
},
{
"category": "self",
"summary": "SUSE Bug 1173954",
"url": "https://bugzilla.suse.com/1173954"
},
{
"category": "self",
"summary": "SUSE Bug 1174003",
"url": "https://bugzilla.suse.com/1174003"
},
{
"category": "self",
"summary": "SUSE Bug 1174026",
"url": "https://bugzilla.suse.com/1174026"
},
{
"category": "self",
"summary": "SUSE Bug 1174205",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "self",
"summary": "SUSE Bug 1174387",
"url": "https://bugzilla.suse.com/1174387"
},
{
"category": "self",
"summary": "SUSE Bug 1174484",
"url": "https://bugzilla.suse.com/1174484"
},
{
"category": "self",
"summary": "SUSE Bug 1174547",
"url": "https://bugzilla.suse.com/1174547"
},
{
"category": "self",
"summary": "SUSE Bug 1174550",
"url": "https://bugzilla.suse.com/1174550"
},
{
"category": "self",
"summary": "SUSE Bug 1174625",
"url": "https://bugzilla.suse.com/1174625"
},
{
"category": "self",
"summary": "SUSE Bug 1174689",
"url": "https://bugzilla.suse.com/1174689"
},
{
"category": "self",
"summary": "SUSE Bug 1174699",
"url": "https://bugzilla.suse.com/1174699"
},
{
"category": "self",
"summary": "SUSE Bug 1174734",
"url": "https://bugzilla.suse.com/1174734"
},
{
"category": "self",
"summary": "SUSE Bug 1174771",
"url": "https://bugzilla.suse.com/1174771"
},
{
"category": "self",
"summary": "SUSE Bug 1174852",
"url": "https://bugzilla.suse.com/1174852"
},
{
"category": "self",
"summary": "SUSE Bug 1174873",
"url": "https://bugzilla.suse.com/1174873"
},
{
"category": "self",
"summary": "SUSE Bug 1174904",
"url": "https://bugzilla.suse.com/1174904"
},
{
"category": "self",
"summary": "SUSE Bug 1174926",
"url": "https://bugzilla.suse.com/1174926"
},
{
"category": "self",
"summary": "SUSE Bug 1174968",
"url": "https://bugzilla.suse.com/1174968"
},
{
"category": "self",
"summary": "SUSE Bug 1175062",
"url": "https://bugzilla.suse.com/1175062"
},
{
"category": "self",
"summary": "SUSE Bug 1175063",
"url": "https://bugzilla.suse.com/1175063"
},
{
"category": "self",
"summary": "SUSE Bug 1175064",
"url": "https://bugzilla.suse.com/1175064"
},
{
"category": "self",
"summary": "SUSE Bug 1175065",
"url": "https://bugzilla.suse.com/1175065"
},
{
"category": "self",
"summary": "SUSE Bug 1175066",
"url": "https://bugzilla.suse.com/1175066"
},
{
"category": "self",
"summary": "SUSE Bug 1175067",
"url": "https://bugzilla.suse.com/1175067"
},
{
"category": "self",
"summary": "SUSE Bug 1175112",
"url": "https://bugzilla.suse.com/1175112"
},
{
"category": "self",
"summary": "SUSE Bug 1175127",
"url": "https://bugzilla.suse.com/1175127"
},
{
"category": "self",
"summary": "SUSE Bug 1175128",
"url": "https://bugzilla.suse.com/1175128"
},
{
"category": "self",
"summary": "SUSE Bug 1175149",
"url": "https://bugzilla.suse.com/1175149"
},
{
"category": "self",
"summary": "SUSE Bug 1175199",
"url": "https://bugzilla.suse.com/1175199"
},
{
"category": "self",
"summary": "SUSE Bug 1175213",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "self",
"summary": "SUSE Bug 1175228",
"url": "https://bugzilla.suse.com/1175228"
},
{
"category": "self",
"summary": "SUSE Bug 1175232",
"url": "https://bugzilla.suse.com/1175232"
},
{
"category": "self",
"summary": "SUSE Bug 1175284",
"url": "https://bugzilla.suse.com/1175284"
},
{
"category": "self",
"summary": "SUSE Bug 1175393",
"url": "https://bugzilla.suse.com/1175393"
},
{
"category": "self",
"summary": "SUSE Bug 1175394",
"url": "https://bugzilla.suse.com/1175394"
},
{
"category": "self",
"summary": "SUSE Bug 1175396",
"url": "https://bugzilla.suse.com/1175396"
},
{
"category": "self",
"summary": "SUSE Bug 1175397",
"url": "https://bugzilla.suse.com/1175397"
},
{
"category": "self",
"summary": "SUSE Bug 1175398",
"url": "https://bugzilla.suse.com/1175398"
},
{
"category": "self",
"summary": "SUSE Bug 1175399",
"url": "https://bugzilla.suse.com/1175399"
},
{
"category": "self",
"summary": "SUSE Bug 1175400",
"url": "https://bugzilla.suse.com/1175400"
},
{
"category": "self",
"summary": "SUSE Bug 1175401",
"url": "https://bugzilla.suse.com/1175401"
},
{
"category": "self",
"summary": "SUSE Bug 1175402",
"url": "https://bugzilla.suse.com/1175402"
},
{
"category": "self",
"summary": "SUSE Bug 1175403",
"url": "https://bugzilla.suse.com/1175403"
},
{
"category": "self",
"summary": "SUSE Bug 1175404",
"url": "https://bugzilla.suse.com/1175404"
},
{
"category": "self",
"summary": "SUSE Bug 1175405",
"url": "https://bugzilla.suse.com/1175405"
},
{
"category": "self",
"summary": "SUSE Bug 1175406",
"url": "https://bugzilla.suse.com/1175406"
},
{
"category": "self",
"summary": "SUSE Bug 1175407",
"url": "https://bugzilla.suse.com/1175407"
},
{
"category": "self",
"summary": "SUSE Bug 1175408",
"url": "https://bugzilla.suse.com/1175408"
},
{
"category": "self",
"summary": "SUSE Bug 1175409",
"url": "https://bugzilla.suse.com/1175409"
},
{
"category": "self",
"summary": "SUSE Bug 1175410",
"url": "https://bugzilla.suse.com/1175410"
},
{
"category": "self",
"summary": "SUSE Bug 1175411",
"url": "https://bugzilla.suse.com/1175411"
},
{
"category": "self",
"summary": "SUSE Bug 1175412",
"url": "https://bugzilla.suse.com/1175412"
},
{
"category": "self",
"summary": "SUSE Bug 1175413",
"url": "https://bugzilla.suse.com/1175413"
},
{
"category": "self",
"summary": "SUSE Bug 1175414",
"url": "https://bugzilla.suse.com/1175414"
},
{
"category": "self",
"summary": "SUSE Bug 1175415",
"url": "https://bugzilla.suse.com/1175415"
},
{
"category": "self",
"summary": "SUSE Bug 1175416",
"url": "https://bugzilla.suse.com/1175416"
},
{
"category": "self",
"summary": "SUSE Bug 1175417",
"url": "https://bugzilla.suse.com/1175417"
},
{
"category": "self",
"summary": "SUSE Bug 1175418",
"url": "https://bugzilla.suse.com/1175418"
},
{
"category": "self",
"summary": "SUSE Bug 1175419",
"url": "https://bugzilla.suse.com/1175419"
},
{
"category": "self",
"summary": "SUSE Bug 1175420",
"url": "https://bugzilla.suse.com/1175420"
},
{
"category": "self",
"summary": "SUSE Bug 1175421",
"url": "https://bugzilla.suse.com/1175421"
},
{
"category": "self",
"summary": "SUSE Bug 1175422",
"url": "https://bugzilla.suse.com/1175422"
},
{
"category": "self",
"summary": "SUSE Bug 1175423",
"url": "https://bugzilla.suse.com/1175423"
},
{
"category": "self",
"summary": "SUSE Bug 1175440",
"url": "https://bugzilla.suse.com/1175440"
},
{
"category": "self",
"summary": "SUSE Bug 1175493",
"url": "https://bugzilla.suse.com/1175493"
},
{
"category": "self",
"summary": "SUSE Bug 1175515",
"url": "https://bugzilla.suse.com/1175515"
},
{
"category": "self",
"summary": "SUSE Bug 1175518",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "self",
"summary": "SUSE Bug 1175526",
"url": "https://bugzilla.suse.com/1175526"
},
{
"category": "self",
"summary": "SUSE Bug 1175550",
"url": "https://bugzilla.suse.com/1175550"
},
{
"category": "self",
"summary": "SUSE Bug 1175654",
"url": "https://bugzilla.suse.com/1175654"
},
{
"category": "self",
"summary": "SUSE Bug 1175666",
"url": "https://bugzilla.suse.com/1175666"
},
{
"category": "self",
"summary": "SUSE Bug 1175667",
"url": "https://bugzilla.suse.com/1175667"
},
{
"category": "self",
"summary": "SUSE Bug 1175668",
"url": "https://bugzilla.suse.com/1175668"
},
{
"category": "self",
"summary": "SUSE Bug 1175669",
"url": "https://bugzilla.suse.com/1175669"
},
{
"category": "self",
"summary": "SUSE Bug 1175670",
"url": "https://bugzilla.suse.com/1175670"
},
{
"category": "self",
"summary": "SUSE Bug 1175767",
"url": "https://bugzilla.suse.com/1175767"
},
{
"category": "self",
"summary": "SUSE Bug 1175768",
"url": "https://bugzilla.suse.com/1175768"
},
{
"category": "self",
"summary": "SUSE Bug 1175769",
"url": "https://bugzilla.suse.com/1175769"
},
{
"category": "self",
"summary": "SUSE Bug 1175770",
"url": "https://bugzilla.suse.com/1175770"
},
{
"category": "self",
"summary": "SUSE Bug 1175771",
"url": "https://bugzilla.suse.com/1175771"
},
{
"category": "self",
"summary": "SUSE Bug 1175772",
"url": "https://bugzilla.suse.com/1175772"
},
{
"category": "self",
"summary": "SUSE Bug 1175786",
"url": "https://bugzilla.suse.com/1175786"
},
{
"category": "self",
"summary": "SUSE Bug 1175873",
"url": "https://bugzilla.suse.com/1175873"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14314 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14356 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1749 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24394/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2020-09-02T14:23:30Z",
"generator": {
"date": "2020-09-02T14:23:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1325-1",
"initial_release_date": "2020-09-02T14:23:30Z",
"revision_history": [
{
"date": "2020-09-02T14:23:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-devel-4.12.14-lp151.28.63.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-docs-4.12.14-lp151.28.63.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-macros-4.12.14-lp151.28.63.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-source-4.12.14-lp151.28.63.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-default-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2020-14314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14314"
}
],
"notes": [
{
"category": "general",
"text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14314",
"url": "https://www.suse.com/security/cve/CVE-2020-14314"
},
{
"category": "external",
"summary": "SUSE Bug 1173798 for CVE-2020-14314",
"url": "https://bugzilla.suse.com/1173798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "moderate"
}
],
"title": "CVE-2020-14314"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14356"
}
],
"notes": [
{
"category": "general",
"text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14356",
"url": "https://www.suse.com/security/cve/CVE-2020-14356"
},
{
"category": "external",
"summary": "SUSE Bug 1175213 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "external",
"summary": "SUSE Bug 1176392 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1176392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "moderate"
}
],
"title": "CVE-2020-14356"
},
{
"cve": "CVE-2020-1749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1749"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1749",
"url": "https://www.suse.com/security/cve/CVE-2020-1749"
},
{
"category": "external",
"summary": "SUSE Bug 1165629 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1165629"
},
{
"category": "external",
"summary": "SUSE Bug 1165631 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1165631"
},
{
"category": "external",
"summary": "SUSE Bug 1177511 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1177511"
},
{
"category": "external",
"summary": "SUSE Bug 1177513 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1177513"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "important"
}
],
"title": "CVE-2020-1749"
},
{
"cve": "CVE-2020-24394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24394"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24394",
"url": "https://www.suse.com/security/cve/CVE-2020-24394"
},
{
"category": "external",
"summary": "SUSE Bug 1175518 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "external",
"summary": "SUSE Bug 1175992 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.63.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.63.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.63.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-02T14:23:30Z",
"details": "important"
}
],
"title": "CVE-2020-24394"
}
]
}
OPENSUSE-SU-2019:1438-1
Vulnerability from csaf_opensuse - Published: 2019-05-23 08:24 - Updated: 2019-05-23 08:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Better String parsing (bsc#1132728).\n- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).\n- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).\n- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE\n\nNon-Security issue fixed:\n\n- Disable LTO (bsc#1133135).\n- Added Japanese new era name.\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1438",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1438-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1438-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1438-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M"
},
{
"category": "self",
"summary": "SUSE Bug 1132728",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "self",
"summary": "SUSE Bug 1132729",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "self",
"summary": "SUSE Bug 1132732",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "self",
"summary": "SUSE Bug 1133135",
"url": "https://bugzilla.suse.com/1133135"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2684 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2698/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2019-05-23T08:24:19Z",
"generator": {
"date": "2019-05-23T08:24:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1438-1",
"initial_release_date": "2019-05-23T08:24:19Z",
"revision_history": [
{
"date": "2019-05-23T08:24:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-23T08:24:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2602",
"url": "https://www.suse.com/security/cve/CVE-2019-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1132728 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1134718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-23T08:24:19Z",
"details": "moderate"
}
],
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2684"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2684",
"url": "https://www.suse.com/security/cve/CVE-2019-2684"
},
{
"category": "external",
"summary": "SUSE Bug 1132732 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1184734 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1184734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-23T08:24:19Z",
"details": "moderate"
}
],
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2698"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2698",
"url": "https://www.suse.com/security/cve/CVE-2019-2698"
},
{
"category": "external",
"summary": "SUSE Bug 1132729 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.212-lp150.2.16.1.x86_64",
"openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.212-lp150.2.16.1.noarch",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.i586",
"openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.212-lp150.2.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-23T08:24:19Z",
"details": "important"
}
],
"title": "CVE-2019-2698"
}
]
}
OPENSUSE-SU-2024:10876-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10876",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10876-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10165 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5546 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5547 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5548 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5549 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5552 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9843 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10053 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10067 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10074 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10078 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10081 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10086 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10087 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10089 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10090 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10096 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10101 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10102 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10105 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10107 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10108 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10109 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10110 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10111 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10114 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10115 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10116 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10118 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10125 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10176 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10193 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10198 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10243 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10274 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10281 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10285 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10295 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10345 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10346 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10346/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10347 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10348 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10349 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10350 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10355 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10355/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10356 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10357 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10357/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10388 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3231 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3241 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3252 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3253 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3260 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3261 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3272 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3289 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3511 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3512 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3514 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3514/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3533 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3539 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3544 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11212 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13785 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16435 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2579 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2582 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2599 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2603 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2618 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2629 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2633 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2634 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2637 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2641 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2677 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2677/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2678 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2678/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2790 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2794 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2795 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2796 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2797 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2798 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2799 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2800 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2814 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2815 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3136 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3139 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3149 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3180 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3183 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3214 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2422 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2426 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2684 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2745 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2766 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2786 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2894 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2933 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2933/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2945 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2949 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2958 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2962 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2964 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2975 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2978 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2981 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2983 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2987 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2987/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2988 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2989 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2992 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2999 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7317 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14556 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14577 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14578 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14579 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14581 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14583 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14593 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14621 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14779 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14781 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14782 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14792 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14796 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14797 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14798 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14803 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2583 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2590 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2593 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2601 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2604 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2654 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2654/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2659 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2754 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2755 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2756 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2757 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2773 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2781 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2800 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2803 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2805 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-2830 page",
"url": "https://www.suse.com/security/cve/CVE-2020-2830/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2161 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2163 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2369 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2388 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2388/"
}
],
"title": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10876-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10165"
}
],
"notes": [
{
"category": "general",
"text": "The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10165",
"url": "https://www.suse.com/security/cve/CVE-2016-10165"
},
{
"category": "external",
"summary": "SUSE Bug 1021364 for CVE-2016-10165",
"url": "https://bugzilla.suse.com/1021364"
},
{
"category": "external",
"summary": "SUSE Bug 1064069 for CVE-2016-10165",
"url": "https://bugzilla.suse.com/1064069"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2016-10165",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10165"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-5546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5546"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5546",
"url": "https://www.suse.com/security/cve/CVE-2016-5546"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2016-5546",
"url": "https://bugzilla.suse.com/1020905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-5546"
},
{
"cve": "CVE-2016-5547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5547"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5547",
"url": "https://www.suse.com/security/cve/CVE-2016-5547"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2016-5547",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-5547",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5547"
},
{
"cve": "CVE-2016-5548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5548"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5548",
"url": "https://www.suse.com/security/cve/CVE-2016-5548"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2016-5548",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-5548",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-5548"
},
{
"cve": "CVE-2016-5549",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5549"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5549",
"url": "https://www.suse.com/security/cve/CVE-2016-5549"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2016-5549",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-5549",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-5549"
},
{
"cve": "CVE-2016-5552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5552"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5552",
"url": "https://www.suse.com/security/cve/CVE-2016-5552"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2016-5552",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-5552",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-5552"
},
{
"cve": "CVE-2016-9840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9840"
}
],
"notes": [
{
"category": "general",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9840",
"url": "https://www.suse.com/security/cve/CVE-2016-9840"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9843"
}
],
"notes": [
{
"category": "general",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9843",
"url": "https://www.suse.com/security/cve/CVE-2016-9843"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1013882 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1013882"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1116686"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-10053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10053"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10053",
"url": "https://www.suse.com/security/cve/CVE-2017-10053"
},
{
"category": "external",
"summary": "SUSE Bug 1049305 for CVE-2017-10053",
"url": "https://bugzilla.suse.com/1049305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10053"
},
{
"cve": "CVE-2017-10067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10067"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10067",
"url": "https://www.suse.com/security/cve/CVE-2017-10067"
},
{
"category": "external",
"summary": "SUSE Bug 1049306 for CVE-2017-10067",
"url": "https://bugzilla.suse.com/1049306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10067"
},
{
"cve": "CVE-2017-10074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10074"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10074",
"url": "https://www.suse.com/security/cve/CVE-2017-10074"
},
{
"category": "external",
"summary": "SUSE Bug 1049307 for CVE-2017-10074",
"url": "https://bugzilla.suse.com/1049307"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10074",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10074"
},
{
"cve": "CVE-2017-10078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10078"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10078",
"url": "https://www.suse.com/security/cve/CVE-2017-10078"
},
{
"category": "external",
"summary": "SUSE Bug 1049308 for CVE-2017-10078",
"url": "https://bugzilla.suse.com/1049308"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10078",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10078"
},
{
"cve": "CVE-2017-10081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10081"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10081",
"url": "https://www.suse.com/security/cve/CVE-2017-10081"
},
{
"category": "external",
"summary": "SUSE Bug 1049309 for CVE-2017-10081",
"url": "https://bugzilla.suse.com/1049309"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10081",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10081"
},
{
"cve": "CVE-2017-10086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10086"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10086",
"url": "https://www.suse.com/security/cve/CVE-2017-10086"
},
{
"category": "external",
"summary": "SUSE Bug 1049310 for CVE-2017-10086",
"url": "https://bugzilla.suse.com/1049310"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10086",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10086"
},
{
"cve": "CVE-2017-10087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10087"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10087",
"url": "https://www.suse.com/security/cve/CVE-2017-10087"
},
{
"category": "external",
"summary": "SUSE Bug 1049311 for CVE-2017-10087",
"url": "https://bugzilla.suse.com/1049311"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10087",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10087"
},
{
"cve": "CVE-2017-10089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10089"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10089",
"url": "https://www.suse.com/security/cve/CVE-2017-10089"
},
{
"category": "external",
"summary": "SUSE Bug 1049312 for CVE-2017-10089",
"url": "https://bugzilla.suse.com/1049312"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10089",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10089"
},
{
"cve": "CVE-2017-10090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10090"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10090",
"url": "https://www.suse.com/security/cve/CVE-2017-10090"
},
{
"category": "external",
"summary": "SUSE Bug 1049313 for CVE-2017-10090",
"url": "https://bugzilla.suse.com/1049313"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10090",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10090"
},
{
"cve": "CVE-2017-10096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10096"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10096",
"url": "https://www.suse.com/security/cve/CVE-2017-10096"
},
{
"category": "external",
"summary": "SUSE Bug 1049314 for CVE-2017-10096",
"url": "https://bugzilla.suse.com/1049314"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10096",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10096"
},
{
"cve": "CVE-2017-10101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10101"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10101",
"url": "https://www.suse.com/security/cve/CVE-2017-10101"
},
{
"category": "external",
"summary": "SUSE Bug 1049315 for CVE-2017-10101",
"url": "https://bugzilla.suse.com/1049315"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10101",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10101"
},
{
"cve": "CVE-2017-10102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10102"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10102",
"url": "https://www.suse.com/security/cve/CVE-2017-10102"
},
{
"category": "external",
"summary": "SUSE Bug 1049316 for CVE-2017-10102",
"url": "https://bugzilla.suse.com/1049316"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10102",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10102"
},
{
"cve": "CVE-2017-10105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10105"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10105",
"url": "https://www.suse.com/security/cve/CVE-2017-10105"
},
{
"category": "external",
"summary": "SUSE Bug 1049317 for CVE-2017-10105",
"url": "https://bugzilla.suse.com/1049317"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10105",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10105"
},
{
"cve": "CVE-2017-10107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10107"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10107",
"url": "https://www.suse.com/security/cve/CVE-2017-10107"
},
{
"category": "external",
"summary": "SUSE Bug 1049318 for CVE-2017-10107",
"url": "https://bugzilla.suse.com/1049318"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10107",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-10107"
},
{
"cve": "CVE-2017-10108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10108"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10108",
"url": "https://www.suse.com/security/cve/CVE-2017-10108"
},
{
"category": "external",
"summary": "SUSE Bug 1049319 for CVE-2017-10108",
"url": "https://bugzilla.suse.com/1049319"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10108",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10108"
},
{
"cve": "CVE-2017-10109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10109"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10109",
"url": "https://www.suse.com/security/cve/CVE-2017-10109"
},
{
"category": "external",
"summary": "SUSE Bug 1049320 for CVE-2017-10109",
"url": "https://bugzilla.suse.com/1049320"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10109",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10109"
},
{
"cve": "CVE-2017-10110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10110"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10110",
"url": "https://www.suse.com/security/cve/CVE-2017-10110"
},
{
"category": "external",
"summary": "SUSE Bug 1049321 for CVE-2017-10110",
"url": "https://bugzilla.suse.com/1049321"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10110",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10110"
},
{
"cve": "CVE-2017-10111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10111"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10111",
"url": "https://www.suse.com/security/cve/CVE-2017-10111"
},
{
"category": "external",
"summary": "SUSE Bug 1049322 for CVE-2017-10111",
"url": "https://bugzilla.suse.com/1049322"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10111",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10111"
},
{
"cve": "CVE-2017-10114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10114"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10114",
"url": "https://www.suse.com/security/cve/CVE-2017-10114"
},
{
"category": "external",
"summary": "SUSE Bug 1049323 for CVE-2017-10114",
"url": "https://bugzilla.suse.com/1049323"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10114",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10114"
},
{
"cve": "CVE-2017-10115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10115"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10115",
"url": "https://www.suse.com/security/cve/CVE-2017-10115"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-10115",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1049324 for CVE-2017-10115",
"url": "https://bugzilla.suse.com/1049324"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10115",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10115"
},
{
"cve": "CVE-2017-10116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10116"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10116",
"url": "https://www.suse.com/security/cve/CVE-2017-10116"
},
{
"category": "external",
"summary": "SUSE Bug 1049325 for CVE-2017-10116",
"url": "https://bugzilla.suse.com/1049325"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10116",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10116"
},
{
"cve": "CVE-2017-10118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10118"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10118",
"url": "https://www.suse.com/security/cve/CVE-2017-10118"
},
{
"category": "external",
"summary": "SUSE Bug 1049326 for CVE-2017-10118",
"url": "https://bugzilla.suse.com/1049326"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10118",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10118"
},
{
"cve": "CVE-2017-10125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10125"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10125",
"url": "https://www.suse.com/security/cve/CVE-2017-10125"
},
{
"category": "external",
"summary": "SUSE Bug 1049327 for CVE-2017-10125",
"url": "https://bugzilla.suse.com/1049327"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10125",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10125"
},
{
"cve": "CVE-2017-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10135"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10135",
"url": "https://www.suse.com/security/cve/CVE-2017-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1049328 for CVE-2017-10135",
"url": "https://bugzilla.suse.com/1049328"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10135",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10135"
},
{
"cve": "CVE-2017-10176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10176"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10176",
"url": "https://www.suse.com/security/cve/CVE-2017-10176"
},
{
"category": "external",
"summary": "SUSE Bug 1049329 for CVE-2017-10176",
"url": "https://bugzilla.suse.com/1049329"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10176",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10176"
},
{
"cve": "CVE-2017-10193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10193"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10193",
"url": "https://www.suse.com/security/cve/CVE-2017-10193"
},
{
"category": "external",
"summary": "SUSE Bug 1049330 for CVE-2017-10193",
"url": "https://bugzilla.suse.com/1049330"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10193",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-10193"
},
{
"cve": "CVE-2017-10198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10198"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10198",
"url": "https://www.suse.com/security/cve/CVE-2017-10198"
},
{
"category": "external",
"summary": "SUSE Bug 1049331 for CVE-2017-10198",
"url": "https://bugzilla.suse.com/1049331"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10198",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10198"
},
{
"cve": "CVE-2017-10243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10243"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10243",
"url": "https://www.suse.com/security/cve/CVE-2017-10243"
},
{
"category": "external",
"summary": "SUSE Bug 1049332 for CVE-2017-10243",
"url": "https://bugzilla.suse.com/1049332"
},
{
"category": "external",
"summary": "SUSE Bug 1049333 for CVE-2017-10243",
"url": "https://bugzilla.suse.com/1049333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10243"
},
{
"cve": "CVE-2017-10274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10274"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10274",
"url": "https://www.suse.com/security/cve/CVE-2017-10274"
},
{
"category": "external",
"summary": "SUSE Bug 1064071 for CVE-2017-10274",
"url": "https://bugzilla.suse.com/1064071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10274"
},
{
"cve": "CVE-2017-10281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10281"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10281",
"url": "https://www.suse.com/security/cve/CVE-2017-10281"
},
{
"category": "external",
"summary": "SUSE Bug 1064072 for CVE-2017-10281",
"url": "https://bugzilla.suse.com/1064072"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10281",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10281"
},
{
"cve": "CVE-2017-10285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10285"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10285",
"url": "https://www.suse.com/security/cve/CVE-2017-10285"
},
{
"category": "external",
"summary": "SUSE Bug 1064073 for CVE-2017-10285",
"url": "https://bugzilla.suse.com/1064073"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10285",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10285"
},
{
"cve": "CVE-2017-10295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10295"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10295",
"url": "https://www.suse.com/security/cve/CVE-2017-10295"
},
{
"category": "external",
"summary": "SUSE Bug 1064075 for CVE-2017-10295",
"url": "https://bugzilla.suse.com/1064075"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10295",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10295"
},
{
"cve": "CVE-2017-10345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10345"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10345",
"url": "https://www.suse.com/security/cve/CVE-2017-10345"
},
{
"category": "external",
"summary": "SUSE Bug 1064077 for CVE-2017-10345",
"url": "https://bugzilla.suse.com/1064077"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10345",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-10345"
},
{
"cve": "CVE-2017-10346",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10346"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10346",
"url": "https://www.suse.com/security/cve/CVE-2017-10346"
},
{
"category": "external",
"summary": "SUSE Bug 1064078 for CVE-2017-10346",
"url": "https://bugzilla.suse.com/1064078"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10346",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-10346"
},
{
"cve": "CVE-2017-10347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10347"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10347",
"url": "https://www.suse.com/security/cve/CVE-2017-10347"
},
{
"category": "external",
"summary": "SUSE Bug 1064079 for CVE-2017-10347",
"url": "https://bugzilla.suse.com/1064079"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10347",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10347"
},
{
"cve": "CVE-2017-10348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10348"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10348",
"url": "https://www.suse.com/security/cve/CVE-2017-10348"
},
{
"category": "external",
"summary": "SUSE Bug 1064080 for CVE-2017-10348",
"url": "https://bugzilla.suse.com/1064080"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10348",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10348"
},
{
"cve": "CVE-2017-10349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10349"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10349",
"url": "https://www.suse.com/security/cve/CVE-2017-10349"
},
{
"category": "external",
"summary": "SUSE Bug 1064081 for CVE-2017-10349",
"url": "https://bugzilla.suse.com/1064081"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10349",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10349"
},
{
"cve": "CVE-2017-10350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10350"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10350",
"url": "https://www.suse.com/security/cve/CVE-2017-10350"
},
{
"category": "external",
"summary": "SUSE Bug 1064082 for CVE-2017-10350",
"url": "https://bugzilla.suse.com/1064082"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10350",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10350"
},
{
"cve": "CVE-2017-10355",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10355"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10355",
"url": "https://www.suse.com/security/cve/CVE-2017-10355"
},
{
"category": "external",
"summary": "SUSE Bug 1064083 for CVE-2017-10355",
"url": "https://bugzilla.suse.com/1064083"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10355",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10355"
},
{
"cve": "CVE-2017-10356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10356"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10356",
"url": "https://www.suse.com/security/cve/CVE-2017-10356"
},
{
"category": "external",
"summary": "SUSE Bug 1064084 for CVE-2017-10356",
"url": "https://bugzilla.suse.com/1064084"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10356",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10356"
},
{
"cve": "CVE-2017-10357",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10357"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10357",
"url": "https://www.suse.com/security/cve/CVE-2017-10357"
},
{
"category": "external",
"summary": "SUSE Bug 1064085 for CVE-2017-10357",
"url": "https://bugzilla.suse.com/1064085"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10357",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10357"
},
{
"cve": "CVE-2017-10388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10388"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10388",
"url": "https://www.suse.com/security/cve/CVE-2017-10388"
},
{
"category": "external",
"summary": "SUSE Bug 1064086 for CVE-2017-10388",
"url": "https://bugzilla.suse.com/1064086"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2017-10388",
"url": "https://bugzilla.suse.com/1070162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10388"
},
{
"cve": "CVE-2017-3231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3231"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3231",
"url": "https://www.suse.com/security/cve/CVE-2017-3231"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3231",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3231",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3231"
},
{
"cve": "CVE-2017-3241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3241"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3241",
"url": "https://www.suse.com/security/cve/CVE-2017-3241"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3241",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3241",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2017-3241",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3241"
},
{
"cve": "CVE-2017-3252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3252"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3252",
"url": "https://www.suse.com/security/cve/CVE-2017-3252"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3252",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3252",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3252"
},
{
"cve": "CVE-2017-3253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3253"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3253",
"url": "https://www.suse.com/security/cve/CVE-2017-3253"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3253",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3253",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3253"
},
{
"cve": "CVE-2017-3260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3260"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3260",
"url": "https://www.suse.com/security/cve/CVE-2017-3260"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3260",
"url": "https://bugzilla.suse.com/1020905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3260"
},
{
"cve": "CVE-2017-3261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3261"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3261",
"url": "https://www.suse.com/security/cve/CVE-2017-3261"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3261",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3261",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3261"
},
{
"cve": "CVE-2017-3272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3272"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3272",
"url": "https://www.suse.com/security/cve/CVE-2017-3272"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3272",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3272",
"url": "https://bugzilla.suse.com/1024218"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3272"
},
{
"cve": "CVE-2017-3289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3289"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3289",
"url": "https://www.suse.com/security/cve/CVE-2017-3289"
},
{
"category": "external",
"summary": "SUSE Bug 1020905 for CVE-2017-3289",
"url": "https://bugzilla.suse.com/1020905"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2017-3289",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2017-3289",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-3289"
},
{
"cve": "CVE-2017-3509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3509"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3509",
"url": "https://www.suse.com/security/cve/CVE-2017-3509"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3509",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3509",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3509"
},
{
"cve": "CVE-2017-3511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3511"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3511",
"url": "https://www.suse.com/security/cve/CVE-2017-3511"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3511",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3511",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3511"
},
{
"cve": "CVE-2017-3512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3512"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3512",
"url": "https://www.suse.com/security/cve/CVE-2017-3512"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3512",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3512",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3512"
},
{
"cve": "CVE-2017-3514",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3514"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3514",
"url": "https://www.suse.com/security/cve/CVE-2017-3514"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3514",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3514",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3514"
},
{
"cve": "CVE-2017-3526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3526"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3526",
"url": "https://www.suse.com/security/cve/CVE-2017-3526"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3526",
"url": "https://bugzilla.suse.com/1034849"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3526"
},
{
"cve": "CVE-2017-3533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3533"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3533",
"url": "https://www.suse.com/security/cve/CVE-2017-3533"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3533",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3533",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-3533"
},
{
"cve": "CVE-2017-3539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3539"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3539",
"url": "https://www.suse.com/security/cve/CVE-2017-3539"
},
{
"category": "external",
"summary": "SUSE Bug 1005522 for CVE-2017-3539",
"url": "https://bugzilla.suse.com/1005522"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3539",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3539",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-3539"
},
{
"cve": "CVE-2017-3544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3544"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3544",
"url": "https://www.suse.com/security/cve/CVE-2017-3544"
},
{
"category": "external",
"summary": "SUSE Bug 1034849 for CVE-2017-3544",
"url": "https://bugzilla.suse.com/1034849"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2017-3544",
"url": "https://bugzilla.suse.com/1038505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-3544"
},
{
"cve": "CVE-2018-11212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11212",
"url": "https://www.suse.com/security/cve/CVE-2018-11212"
},
{
"category": "external",
"summary": "SUSE Bug 1122299 for CVE-2018-11212",
"url": "https://bugzilla.suse.com/1122299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-11212"
},
{
"cve": "CVE-2018-13785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13785"
}
],
"notes": [
{
"category": "general",
"text": "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13785",
"url": "https://www.suse.com/security/cve/CVE-2018-13785"
},
{
"category": "external",
"summary": "SUSE Bug 1100687 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1100687"
},
{
"category": "external",
"summary": "SUSE Bug 1112153 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1112153"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-13785"
},
{
"cve": "CVE-2018-16435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16435"
}
],
"notes": [
{
"category": "general",
"text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16435",
"url": "https://www.suse.com/security/cve/CVE-2018-16435"
},
{
"category": "external",
"summary": "SUSE Bug 1108813 for CVE-2018-16435",
"url": "https://bugzilla.suse.com/1108813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16435"
},
{
"cve": "CVE-2018-2579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2579"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2579",
"url": "https://www.suse.com/security/cve/CVE-2018-2579"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2579",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2579",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-2579"
},
{
"cve": "CVE-2018-2582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2582"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2582",
"url": "https://www.suse.com/security/cve/CVE-2018-2582"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2582",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2582",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2582"
},
{
"cve": "CVE-2018-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2588"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2588",
"url": "https://www.suse.com/security/cve/CVE-2018-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2588",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2588",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2588"
},
{
"cve": "CVE-2018-2599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2599"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2599",
"url": "https://www.suse.com/security/cve/CVE-2018-2599"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2599",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2599",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2599"
},
{
"cve": "CVE-2018-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2602",
"url": "https://www.suse.com/security/cve/CVE-2018-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2602",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2602",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2602"
},
{
"cve": "CVE-2018-2603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2603"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2603",
"url": "https://www.suse.com/security/cve/CVE-2018-2603"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2603",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2603",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2603"
},
{
"cve": "CVE-2018-2618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2618"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2618",
"url": "https://www.suse.com/security/cve/CVE-2018-2618"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2618",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2618",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2618"
},
{
"cve": "CVE-2018-2629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2629"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2629",
"url": "https://www.suse.com/security/cve/CVE-2018-2629"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2629",
"url": "https://bugzilla.suse.com/1076366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2629"
},
{
"cve": "CVE-2018-2633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2633"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2633",
"url": "https://www.suse.com/security/cve/CVE-2018-2633"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2633",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2633",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2633"
},
{
"cve": "CVE-2018-2634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2634"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2634",
"url": "https://www.suse.com/security/cve/CVE-2018-2634"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2634",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2634",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2634"
},
{
"cve": "CVE-2018-2637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2637"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2637",
"url": "https://www.suse.com/security/cve/CVE-2018-2637"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2637",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2637",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2637"
},
{
"cve": "CVE-2018-2641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2641"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2641",
"url": "https://www.suse.com/security/cve/CVE-2018-2641"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2641",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2641",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2641"
},
{
"cve": "CVE-2018-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2663"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2663",
"url": "https://www.suse.com/security/cve/CVE-2018-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2663",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2663",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2663"
},
{
"cve": "CVE-2018-2677",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2677"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2677",
"url": "https://www.suse.com/security/cve/CVE-2018-2677"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2677",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2677",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2677"
},
{
"cve": "CVE-2018-2678",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2678"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2678",
"url": "https://www.suse.com/security/cve/CVE-2018-2678"
},
{
"category": "external",
"summary": "SUSE Bug 1076366 for CVE-2018-2678",
"url": "https://bugzilla.suse.com/1076366"
},
{
"category": "external",
"summary": "SUSE Bug 1082810 for CVE-2018-2678",
"url": "https://bugzilla.suse.com/1082810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2678"
},
{
"cve": "CVE-2018-2790",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2790"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2790",
"url": "https://www.suse.com/security/cve/CVE-2018-2790"
},
{
"category": "external",
"summary": "SUSE Bug 1090023 for CVE-2018-2790",
"url": "https://bugzilla.suse.com/1090023"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2790",
"url": "https://bugzilla.suse.com/1093311"
},
{
"category": "external",
"summary": "SUSE Bug 1101637 for CVE-2018-2790",
"url": "https://bugzilla.suse.com/1101637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-2790"
},
{
"cve": "CVE-2018-2794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2794"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2794",
"url": "https://www.suse.com/security/cve/CVE-2018-2794"
},
{
"category": "external",
"summary": "SUSE Bug 1090024 for CVE-2018-2794",
"url": "https://bugzilla.suse.com/1090024"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2794",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2794"
},
{
"cve": "CVE-2018-2795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2795"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2795",
"url": "https://www.suse.com/security/cve/CVE-2018-2795"
},
{
"category": "external",
"summary": "SUSE Bug 1090025 for CVE-2018-2795",
"url": "https://bugzilla.suse.com/1090025"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2795",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2795"
},
{
"cve": "CVE-2018-2796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2796"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2796",
"url": "https://www.suse.com/security/cve/CVE-2018-2796"
},
{
"category": "external",
"summary": "SUSE Bug 1090026 for CVE-2018-2796",
"url": "https://bugzilla.suse.com/1090026"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2796",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2796"
},
{
"cve": "CVE-2018-2797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2797"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2797",
"url": "https://www.suse.com/security/cve/CVE-2018-2797"
},
{
"category": "external",
"summary": "SUSE Bug 1090027 for CVE-2018-2797",
"url": "https://bugzilla.suse.com/1090027"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2797",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2797"
},
{
"cve": "CVE-2018-2798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2798"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2798",
"url": "https://www.suse.com/security/cve/CVE-2018-2798"
},
{
"category": "external",
"summary": "SUSE Bug 1090028 for CVE-2018-2798",
"url": "https://bugzilla.suse.com/1090028"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2798",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2798"
},
{
"cve": "CVE-2018-2799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2799"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2799",
"url": "https://www.suse.com/security/cve/CVE-2018-2799"
},
{
"category": "external",
"summary": "SUSE Bug 1090029 for CVE-2018-2799",
"url": "https://bugzilla.suse.com/1090029"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2799",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2799"
},
{
"cve": "CVE-2018-2800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2800"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2800",
"url": "https://www.suse.com/security/cve/CVE-2018-2800"
},
{
"category": "external",
"summary": "SUSE Bug 1090030 for CVE-2018-2800",
"url": "https://bugzilla.suse.com/1090030"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2800",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2800"
},
{
"cve": "CVE-2018-2814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2814"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2814",
"url": "https://www.suse.com/security/cve/CVE-2018-2814"
},
{
"category": "external",
"summary": "SUSE Bug 1090032 for CVE-2018-2814",
"url": "https://bugzilla.suse.com/1090032"
},
{
"category": "external",
"summary": "SUSE Bug 1093311 for CVE-2018-2814",
"url": "https://bugzilla.suse.com/1093311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2814"
},
{
"cve": "CVE-2018-2815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2815"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2815",
"url": "https://www.suse.com/security/cve/CVE-2018-2815"
},
{
"category": "external",
"summary": "SUSE Bug 1090033 for CVE-2018-2815",
"url": "https://bugzilla.suse.com/1090033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2815"
},
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3136"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3136",
"url": "https://www.suse.com/security/cve/CVE-2018-3136"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3136"
},
{
"cve": "CVE-2018-3139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3139"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3139",
"url": "https://www.suse.com/security/cve/CVE-2018-3139"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3139"
},
{
"cve": "CVE-2018-3149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3149"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3149",
"url": "https://www.suse.com/security/cve/CVE-2018-3149"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3149"
},
{
"cve": "CVE-2018-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3169"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3169",
"url": "https://www.suse.com/security/cve/CVE-2018-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3169"
},
{
"cve": "CVE-2018-3180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3180"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3180",
"url": "https://www.suse.com/security/cve/CVE-2018-3180"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112147 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112147"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3180"
},
{
"cve": "CVE-2018-3183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3183"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3183",
"url": "https://www.suse.com/security/cve/CVE-2018-3183"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1116574"
},
{
"category": "external",
"summary": "SUSE Bug 1120714 for CVE-2018-3183",
"url": "https://bugzilla.suse.com/1120714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-3183"
},
{
"cve": "CVE-2018-3214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3214"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3214",
"url": "https://www.suse.com/security/cve/CVE-2018-3214"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3214"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2422"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2422",
"url": "https://www.suse.com/security/cve/CVE-2019-2422"
},
{
"category": "external",
"summary": "SUSE Bug 1122293 for CVE-2019-2422",
"url": "https://bugzilla.suse.com/1122293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2422"
},
{
"cve": "CVE-2019-2426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2426"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2426",
"url": "https://www.suse.com/security/cve/CVE-2019-2426"
},
{
"category": "external",
"summary": "SUSE Bug 1134297 for CVE-2019-2426",
"url": "https://bugzilla.suse.com/1134297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2426"
},
{
"cve": "CVE-2019-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2602",
"url": "https://www.suse.com/security/cve/CVE-2019-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1132728 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1134718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2684"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2684",
"url": "https://www.suse.com/security/cve/CVE-2019-2684"
},
{
"category": "external",
"summary": "SUSE Bug 1132732 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1184734 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1184734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2698"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2698",
"url": "https://www.suse.com/security/cve/CVE-2019-2698"
},
{
"category": "external",
"summary": "SUSE Bug 1132729 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2698"
},
{
"cve": "CVE-2019-2745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2745"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2745",
"url": "https://www.suse.com/security/cve/CVE-2019-2745"
},
{
"category": "external",
"summary": "SUSE Bug 1141784 for CVE-2019-2745",
"url": "https://bugzilla.suse.com/1141784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2745"
},
{
"cve": "CVE-2019-2762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2762"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2762",
"url": "https://www.suse.com/security/cve/CVE-2019-2762"
},
{
"category": "external",
"summary": "SUSE Bug 1141782 for CVE-2019-2762",
"url": "https://bugzilla.suse.com/1141782"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2762",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2762"
},
{
"cve": "CVE-2019-2766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2766"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2766",
"url": "https://www.suse.com/security/cve/CVE-2019-2766"
},
{
"category": "external",
"summary": "SUSE Bug 1141789 for CVE-2019-2766",
"url": "https://bugzilla.suse.com/1141789"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2766",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2766"
},
{
"cve": "CVE-2019-2769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2769"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2769",
"url": "https://www.suse.com/security/cve/CVE-2019-2769"
},
{
"category": "external",
"summary": "SUSE Bug 1141783 for CVE-2019-2769",
"url": "https://bugzilla.suse.com/1141783"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2769",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2769"
},
{
"cve": "CVE-2019-2786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2786"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2786",
"url": "https://www.suse.com/security/cve/CVE-2019-2786"
},
{
"category": "external",
"summary": "SUSE Bug 1141787 for CVE-2019-2786",
"url": "https://bugzilla.suse.com/1141787"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2786",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2786"
},
{
"cve": "CVE-2019-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2816"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2816",
"url": "https://www.suse.com/security/cve/CVE-2019-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1141785 for CVE-2019-2816",
"url": "https://bugzilla.suse.com/1141785"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2816",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2816"
},
{
"cve": "CVE-2019-2842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2842"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2842",
"url": "https://www.suse.com/security/cve/CVE-2019-2842"
},
{
"category": "external",
"summary": "SUSE Bug 1141786 for CVE-2019-2842",
"url": "https://bugzilla.suse.com/1141786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2842"
},
{
"cve": "CVE-2019-2894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2894"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2894",
"url": "https://www.suse.com/security/cve/CVE-2019-2894"
},
{
"category": "external",
"summary": "SUSE Bug 1152856 for CVE-2019-2894",
"url": "https://bugzilla.suse.com/1152856"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2894",
"url": "https://bugzilla.suse.com/1154212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2894"
},
{
"cve": "CVE-2019-2933",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2933"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2933",
"url": "https://www.suse.com/security/cve/CVE-2019-2933"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2933",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2933",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2933"
},
{
"cve": "CVE-2019-2945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2945"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2945",
"url": "https://www.suse.com/security/cve/CVE-2019-2945"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2945",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2945",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2945"
},
{
"cve": "CVE-2019-2949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2949"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2949",
"url": "https://www.suse.com/security/cve/CVE-2019-2949"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2949",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2019-2949",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2949"
},
{
"cve": "CVE-2019-2958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2958"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2958",
"url": "https://www.suse.com/security/cve/CVE-2019-2958"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2958",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2958",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2958"
},
{
"cve": "CVE-2019-2962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2962"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2962",
"url": "https://www.suse.com/security/cve/CVE-2019-2962"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2962",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2962",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2962"
},
{
"cve": "CVE-2019-2964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2964"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2964",
"url": "https://www.suse.com/security/cve/CVE-2019-2964"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2964",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2964",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2964"
},
{
"cve": "CVE-2019-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2973",
"url": "https://www.suse.com/security/cve/CVE-2019-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2973",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2973",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2973"
},
{
"cve": "CVE-2019-2975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2975"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2975",
"url": "https://www.suse.com/security/cve/CVE-2019-2975"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2975",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2975",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2975"
},
{
"cve": "CVE-2019-2978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2978"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2978",
"url": "https://www.suse.com/security/cve/CVE-2019-2978"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2978",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2978",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2978"
},
{
"cve": "CVE-2019-2981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2981"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2981",
"url": "https://www.suse.com/security/cve/CVE-2019-2981"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2981",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2981",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2981"
},
{
"cve": "CVE-2019-2983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2983"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2983",
"url": "https://www.suse.com/security/cve/CVE-2019-2983"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2983",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2983",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2983"
},
{
"cve": "CVE-2019-2987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2987"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2987",
"url": "https://www.suse.com/security/cve/CVE-2019-2987"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2987",
"url": "https://bugzilla.suse.com/1154212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2987"
},
{
"cve": "CVE-2019-2988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2988"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2988",
"url": "https://www.suse.com/security/cve/CVE-2019-2988"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2988",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2988",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2988"
},
{
"cve": "CVE-2019-2989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2989"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2989",
"url": "https://www.suse.com/security/cve/CVE-2019-2989"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2989",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2989",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2989"
},
{
"cve": "CVE-2019-2992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2992"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2992",
"url": "https://www.suse.com/security/cve/CVE-2019-2992"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2992",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2992",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2992"
},
{
"cve": "CVE-2019-2999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2999"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2999",
"url": "https://www.suse.com/security/cve/CVE-2019-2999"
},
{
"category": "external",
"summary": "SUSE Bug 1154212 for CVE-2019-2999",
"url": "https://bugzilla.suse.com/1154212"
},
{
"category": "external",
"summary": "SUSE Bug 1158442 for CVE-2019-2999",
"url": "https://bugzilla.suse.com/1158442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-2999"
},
{
"cve": "CVE-2019-7317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7317"
}
],
"notes": [
{
"category": "general",
"text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7317",
"url": "https://www.suse.com/security/cve/CVE-2019-7317"
},
{
"category": "external",
"summary": "SUSE Bug 1124211 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1124211"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1135824"
},
{
"category": "external",
"summary": "SUSE Bug 1141780 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1141780"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1147021"
},
{
"category": "external",
"summary": "SUSE Bug 1165297 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1165297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7317"
},
{
"cve": "CVE-2020-14556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14556"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14556",
"url": "https://www.suse.com/security/cve/CVE-2020-14556"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14556",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14556",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14556"
},
{
"cve": "CVE-2020-14577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14577"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14577",
"url": "https://www.suse.com/security/cve/CVE-2020-14577"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14577",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14577",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14577"
},
{
"cve": "CVE-2020-14578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14578"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14578",
"url": "https://www.suse.com/security/cve/CVE-2020-14578"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14578",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14578",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14578"
},
{
"cve": "CVE-2020-14579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14579"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14579",
"url": "https://www.suse.com/security/cve/CVE-2020-14579"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14579",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14579",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14579"
},
{
"cve": "CVE-2020-14581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14581"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14581",
"url": "https://www.suse.com/security/cve/CVE-2020-14581"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14581",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14581",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14581"
},
{
"cve": "CVE-2020-14583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14583"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14583",
"url": "https://www.suse.com/security/cve/CVE-2020-14583"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14583",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14583",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14583"
},
{
"cve": "CVE-2020-14593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14593"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14593",
"url": "https://www.suse.com/security/cve/CVE-2020-14593"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14593",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14593",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14593"
},
{
"cve": "CVE-2020-14621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14621"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14621",
"url": "https://www.suse.com/security/cve/CVE-2020-14621"
},
{
"category": "external",
"summary": "SUSE Bug 1174157 for CVE-2020-14621",
"url": "https://bugzilla.suse.com/1174157"
},
{
"category": "external",
"summary": "SUSE Bug 1175259 for CVE-2020-14621",
"url": "https://bugzilla.suse.com/1175259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-14621"
},
{
"cve": "CVE-2020-14779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14779"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14779",
"url": "https://www.suse.com/security/cve/CVE-2020-14779"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14779",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14779",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14779"
},
{
"cve": "CVE-2020-14781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14781"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14781",
"url": "https://www.suse.com/security/cve/CVE-2020-14781"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14781",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14781",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14781"
},
{
"cve": "CVE-2020-14782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14782"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14782",
"url": "https://www.suse.com/security/cve/CVE-2020-14782"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14782",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14782",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14782"
},
{
"cve": "CVE-2020-14792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14792"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14792",
"url": "https://www.suse.com/security/cve/CVE-2020-14792"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14792",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14792",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14792"
},
{
"cve": "CVE-2020-14796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14796"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14796",
"url": "https://www.suse.com/security/cve/CVE-2020-14796"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14796",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14796",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14796"
},
{
"cve": "CVE-2020-14797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14797"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14797",
"url": "https://www.suse.com/security/cve/CVE-2020-14797"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14797",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14797",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14797"
},
{
"cve": "CVE-2020-14798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14798"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14798",
"url": "https://www.suse.com/security/cve/CVE-2020-14798"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14798",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1180063 for CVE-2020-14798",
"url": "https://bugzilla.suse.com/1180063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14798"
},
{
"cve": "CVE-2020-14803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14803"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14803",
"url": "https://www.suse.com/security/cve/CVE-2020-14803"
},
{
"category": "external",
"summary": "SUSE Bug 1177943 for CVE-2020-14803",
"url": "https://bugzilla.suse.com/1177943"
},
{
"category": "external",
"summary": "SUSE Bug 1181239 for CVE-2020-14803",
"url": "https://bugzilla.suse.com/1181239"
},
{
"category": "external",
"summary": "SUSE Bug 1182186 for CVE-2020-14803",
"url": "https://bugzilla.suse.com/1182186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14803"
},
{
"cve": "CVE-2020-2583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2583"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2583",
"url": "https://www.suse.com/security/cve/CVE-2020-2583"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2583",
"url": "https://bugzilla.suse.com/1160968"
},
{
"category": "external",
"summary": "SUSE Bug 1162972 for CVE-2020-2583",
"url": "https://bugzilla.suse.com/1162972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2583"
},
{
"cve": "CVE-2020-2590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2590"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2590",
"url": "https://www.suse.com/security/cve/CVE-2020-2590"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2590",
"url": "https://bugzilla.suse.com/1160968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2590"
},
{
"cve": "CVE-2020-2593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2593"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2593",
"url": "https://www.suse.com/security/cve/CVE-2020-2593"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2593",
"url": "https://bugzilla.suse.com/1160968"
},
{
"category": "external",
"summary": "SUSE Bug 1162972 for CVE-2020-2593",
"url": "https://bugzilla.suse.com/1162972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2593"
},
{
"cve": "CVE-2020-2601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2601"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2601",
"url": "https://www.suse.com/security/cve/CVE-2020-2601"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2601",
"url": "https://bugzilla.suse.com/1160968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2601"
},
{
"cve": "CVE-2020-2604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2604"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2604",
"url": "https://www.suse.com/security/cve/CVE-2020-2604"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2604",
"url": "https://bugzilla.suse.com/1160968"
},
{
"category": "external",
"summary": "SUSE Bug 1162972 for CVE-2020-2604",
"url": "https://bugzilla.suse.com/1162972"
},
{
"category": "external",
"summary": "SUSE Bug 1165863 for CVE-2020-2604",
"url": "https://bugzilla.suse.com/1165863"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2604"
},
{
"cve": "CVE-2020-2654",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2654"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2654",
"url": "https://www.suse.com/security/cve/CVE-2020-2654"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2654",
"url": "https://bugzilla.suse.com/1160968"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2654",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2654"
},
{
"cve": "CVE-2020-2659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2659"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2659",
"url": "https://www.suse.com/security/cve/CVE-2020-2659"
},
{
"category": "external",
"summary": "SUSE Bug 1160968 for CVE-2020-2659",
"url": "https://bugzilla.suse.com/1160968"
},
{
"category": "external",
"summary": "SUSE Bug 1162972 for CVE-2020-2659",
"url": "https://bugzilla.suse.com/1162972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-2659"
},
{
"cve": "CVE-2020-2754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2754"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2754",
"url": "https://www.suse.com/security/cve/CVE-2020-2754"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2754",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2754",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2754"
},
{
"cve": "CVE-2020-2755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2755"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2755",
"url": "https://www.suse.com/security/cve/CVE-2020-2755"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2755",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2755",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2755"
},
{
"cve": "CVE-2020-2756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2756"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2756",
"url": "https://www.suse.com/security/cve/CVE-2020-2756"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2756",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2756",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2756"
},
{
"cve": "CVE-2020-2757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2757"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2757",
"url": "https://www.suse.com/security/cve/CVE-2020-2757"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2757",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2757",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2757"
},
{
"cve": "CVE-2020-2773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2773"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2773",
"url": "https://www.suse.com/security/cve/CVE-2020-2773"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2773",
"url": "https://bugzilla.suse.com/1169511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2773"
},
{
"cve": "CVE-2020-2781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2781"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2781",
"url": "https://www.suse.com/security/cve/CVE-2020-2781"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2781",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2781",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2781"
},
{
"cve": "CVE-2020-2800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2800"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2800",
"url": "https://www.suse.com/security/cve/CVE-2020-2800"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2800",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2800",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2800"
},
{
"cve": "CVE-2020-2803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2803"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2803",
"url": "https://www.suse.com/security/cve/CVE-2020-2803"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2803",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2803",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2803"
},
{
"cve": "CVE-2020-2805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2805"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2805",
"url": "https://www.suse.com/security/cve/CVE-2020-2805"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2805",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2805",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2805"
},
{
"cve": "CVE-2020-2830",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-2830"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-2830",
"url": "https://www.suse.com/security/cve/CVE-2020-2830"
},
{
"category": "external",
"summary": "SUSE Bug 1169511 for CVE-2020-2830",
"url": "https://bugzilla.suse.com/1169511"
},
{
"category": "external",
"summary": "SUSE Bug 1172277 for CVE-2020-2830",
"url": "https://bugzilla.suse.com/1172277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-2830"
},
{
"cve": "CVE-2021-2161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2161"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2161",
"url": "https://www.suse.com/security/cve/CVE-2021-2161"
},
{
"category": "external",
"summary": "SUSE Bug 1185056 for CVE-2021-2161",
"url": "https://bugzilla.suse.com/1185056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2161"
},
{
"cve": "CVE-2021-2163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2163"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2163",
"url": "https://www.suse.com/security/cve/CVE-2021-2163"
},
{
"category": "external",
"summary": "SUSE Bug 1185055 for CVE-2021-2163",
"url": "https://bugzilla.suse.com/1185055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2163"
},
{
"cve": "CVE-2021-2341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2341"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2341",
"url": "https://www.suse.com/security/cve/CVE-2021-2341"
},
{
"category": "external",
"summary": "SUSE Bug 1188564 for CVE-2021-2341",
"url": "https://bugzilla.suse.com/1188564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2369"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2369",
"url": "https://www.suse.com/security/cve/CVE-2021-2369"
},
{
"category": "external",
"summary": "SUSE Bug 1188565 for CVE-2021-2369",
"url": "https://bugzilla.suse.com/1188565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2388"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2388",
"url": "https://www.suse.com/security/cve/CVE-2021-2388"
},
{
"category": "external",
"summary": "SUSE Bug 1188566 for CVE-2021-2388",
"url": "https://bugzilla.suse.com/1188566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x",
"openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-2388"
}
]
}
OPENSUSE-SU-2024:10633-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "arm-trusted-firmware-2.5-2.3 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the arm-trusted-firmware-2.5-2.3 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10633",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10633-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "arm-trusted-firmware-2.5-2.3 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10633-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.aarch64",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.aarch64",
"product_id": "arm-trusted-firmware-2.5-2.3.aarch64"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.ppc64le",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.ppc64le",
"product_id": "arm-trusted-firmware-2.5-2.3.ppc64le"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.s390x",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.s390x",
"product_id": "arm-trusted-firmware-2.5-2.3.s390x"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "arm-trusted-firmware-2.5-2.3.x86_64",
"product": {
"name": "arm-trusted-firmware-2.5-2.3.x86_64",
"product_id": "arm-trusted-firmware-2.5-2.3.x86_64"
}
},
{
"category": "product_version",
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"product": {
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"product_id": "arm-trusted-firmware-tools-2.5-2.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-2.5-2.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64"
},
"product_reference": "arm-trusted-firmware-2.5-2.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "arm-trusted-firmware-tools-2.5-2.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
},
"product_reference": "arm-trusted-firmware-tools-2.5-2.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-2.5-2.3.x86_64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.aarch64",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.ppc64le",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.s390x",
"openSUSE Tumbleweed:arm-trusted-firmware-tools-2.5-2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
OPENSUSE-SU-2024:11287-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "qemu-6.1.0-32.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the qemu-6.1.0-32.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11287",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11287-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0222 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5225 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6855 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8504 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10028 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1714 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6836 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7157 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7170 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7422 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7423 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7466 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7908 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7994 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7995 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8576 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8577 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8578 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8667 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8668 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8669 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8910 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9102 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9103 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9104 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9602 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10664 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11334 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11434 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13673 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13711 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15038 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15268 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15289 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2630 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5525 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5552 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5578 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5667 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6058 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7471 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7471/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7493 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8309 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8379 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9503 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9524 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10839 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15746 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17963 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20123 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20125 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20216 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20815 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7858 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-03812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-03812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13164 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8934 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9824 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10717 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10761 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11102 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11869 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13361 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13659 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13800 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14364 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16092 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1711 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-17380 page",
"url": "https://www.suse.com/security/cve/CVE-2020-17380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1983 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25085 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25723 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27821 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29129 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8608 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20181 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20221 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20257 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20263 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3527 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3546 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3682 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3682/"
}
],
"title": "qemu-6.1.0-32.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11287-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-6.1.0-32.1.aarch64",
"product_id": "qemu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product_id": "qemu-arm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-jack-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-pa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product_id": "qemu-block-curl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product_id": "qemu-block-dmg-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product_id": "qemu-block-gluster-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product_id": "qemu-block-nfs-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product_id": "qemu-block-rbd-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product_id": "qemu-block-ssh-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product_id": "qemu-extra-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product_id": "qemu-guest-agent-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product_id": "qemu-ipxe-1.0.0+-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product_id": "qemu-ksm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product_id": "qemu-kvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product_id": "qemu-lang-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product_id": "qemu-microvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product_id": "qemu-ppc-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product_id": "qemu-s390x-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.aarch64",
"product": {
"name": "qemu-sgabios-8-32.1.aarch64",
"product_id": "qemu-sgabios-8-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product_id": "qemu-skiboot-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-curses-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-x86-6.1.0-32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-6.1.0-32.1.ppc64le",
"product_id": "qemu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-qtest-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product_id": "qemu-arm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-alsa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-jack-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-pa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-curl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-dmg-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-gluster-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-iscsi-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-nfs-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-rbd-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-ssh-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-baum-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product_id": "qemu-extra-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product_id": "qemu-guest-agent-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product_id": "qemu-ipxe-1.0.0+-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product_id": "qemu-ksm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-kvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product_id": "qemu-lang-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-microvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product_id": "qemu-ppc-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product_id": "qemu-s390x-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.ppc64le",
"product": {
"name": "qemu-sgabios-8-32.1.ppc64le",
"product_id": "qemu-sgabios-8-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product_id": "qemu-skiboot-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-curses-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-gtk-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-opengl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-x86-6.1.0-32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-6.1.0-32.1.s390x",
"product_id": "qemu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product_id": "qemu-accel-qtest-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-arm-6.1.0-32.1.s390x",
"product_id": "qemu-arm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-alsa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product_id": "qemu-audio-jack-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-pa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product_id": "qemu-audio-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product_id": "qemu-block-curl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product_id": "qemu-block-dmg-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product_id": "qemu-block-gluster-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product_id": "qemu-block-iscsi-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product_id": "qemu-block-nfs-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product_id": "qemu-block-rbd-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product_id": "qemu-block-ssh-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-baum-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.s390x",
"product": {
"name": "qemu-extra-6.1.0-32.1.s390x",
"product_id": "qemu-extra-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product_id": "qemu-guest-agent-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product_id": "qemu-ipxe-1.0.0+-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product_id": "qemu-ksm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product_id": "qemu-kvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.s390x",
"product": {
"name": "qemu-lang-6.1.0-32.1.s390x",
"product_id": "qemu-lang-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product_id": "qemu-microvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product_id": "qemu-ppc-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product": {
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product_id": "qemu-s390x-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.s390x",
"product": {
"name": "qemu-sgabios-8-32.1.s390x",
"product_id": "qemu-sgabios-8-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product_id": "qemu-skiboot-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-tools-6.1.0-32.1.s390x",
"product_id": "qemu-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product_id": "qemu-ui-curses-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product_id": "qemu-ui-gtk-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product_id": "qemu-ui-opengl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-x86-6.1.0-32.1.s390x",
"product_id": "qemu-x86-6.1.0-32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-6.1.0-32.1.x86_64",
"product_id": "qemu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product_id": "qemu-arm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-jack-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-pa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product_id": "qemu-block-curl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product_id": "qemu-block-dmg-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product_id": "qemu-block-gluster-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product_id": "qemu-block-nfs-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product_id": "qemu-block-rbd-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product_id": "qemu-block-ssh-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product_id": "qemu-extra-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product_id": "qemu-guest-agent-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product_id": "qemu-ipxe-1.0.0+-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product_id": "qemu-ksm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product_id": "qemu-kvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product_id": "qemu-lang-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product_id": "qemu-microvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product_id": "qemu-ppc-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product_id": "qemu-s390x-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.x86_64",
"product": {
"name": "qemu-sgabios-8-32.1.x86_64",
"product_id": "qemu-sgabios-8-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product_id": "qemu-skiboot-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-curses-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-x86-6.1.0-32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-arm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-arm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-arm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-arm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-extra-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-extra-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x"
},
"product_reference": "qemu-extra-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-extra-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ksm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ksm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-kvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-kvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-lang-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-lang-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x"
},
"product_reference": "qemu-lang-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-lang-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-microvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-microvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ppc-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ppc-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-s390x-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x"
},
"product_reference": "qemu-s390x-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64"
},
"product_reference": "qemu-sgabios-8-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le"
},
"product_reference": "qemu-sgabios-8-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x"
},
"product_reference": "qemu-sgabios-8-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64"
},
"product_reference": "qemu-sgabios-8-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-0222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0222"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0222",
"url": "https://www.suse.com/security/cve/CVE-2014-0222"
},
{
"category": "external",
"summary": "SUSE Bug 1072223 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/1072223"
},
{
"category": "external",
"summary": "SUSE Bug 877642 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/877642"
},
{
"category": "external",
"summary": "SUSE Bug 950367 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/950367"
},
{
"category": "external",
"summary": "SUSE Bug 964925 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/964925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0222"
},
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2015-5225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5225"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5225",
"url": "https://www.suse.com/security/cve/CVE-2015-5225"
},
{
"category": "external",
"summary": "SUSE Bug 942845 for CVE-2015-5225",
"url": "https://bugzilla.suse.com/942845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-5225"
},
{
"cve": "CVE-2015-6855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6855"
}
],
"notes": [
{
"category": "general",
"text": "hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6855",
"url": "https://www.suse.com/security/cve/CVE-2015-6855"
},
{
"category": "external",
"summary": "SUSE Bug 945404 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/945404"
},
{
"category": "external",
"summary": "SUSE Bug 965156 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/965156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-6855"
},
{
"cve": "CVE-2015-8504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8504"
}
],
"notes": [
{
"category": "general",
"text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8504",
"url": "https://www.suse.com/security/cve/CVE-2015-8504"
},
{
"category": "external",
"summary": "SUSE Bug 958491 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958491"
},
{
"category": "external",
"summary": "SUSE Bug 958493 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8504"
},
{
"cve": "CVE-2015-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8619"
}
],
"notes": [
{
"category": "general",
"text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8619",
"url": "https://www.suse.com/security/cve/CVE-2015-8619"
},
{
"category": "external",
"summary": "SUSE Bug 960334 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/960334"
},
{
"category": "external",
"summary": "SUSE Bug 965269 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/965269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8619"
},
{
"cve": "CVE-2016-10028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10028"
}
],
"notes": [
{
"category": "general",
"text": "The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10028",
"url": "https://www.suse.com/security/cve/CVE-2016-10028"
},
{
"category": "external",
"summary": "SUSE Bug 1017084 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017084"
},
{
"category": "external",
"summary": "SUSE Bug 1017085 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017085"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10028"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-1714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1714"
}
],
"notes": [
{
"category": "general",
"text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1714",
"url": "https://www.suse.com/security/cve/CVE-2016-1714"
},
{
"category": "external",
"summary": "SUSE Bug 961691 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961691"
},
{
"category": "external",
"summary": "SUSE Bug 961692 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1714"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-6836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6836"
}
],
"notes": [
{
"category": "general",
"text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6836",
"url": "https://www.suse.com/security/cve/CVE-2016-6836"
},
{
"category": "external",
"summary": "SUSE Bug 994760 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "external",
"summary": "SUSE Bug 994761 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6836"
},
{
"cve": "CVE-2016-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7156"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7156",
"url": "https://www.suse.com/security/cve/CVE-2016-7156"
},
{
"category": "external",
"summary": "SUSE Bug 997859 for CVE-2016-7156",
"url": "https://bugzilla.suse.com/997859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7156"
},
{
"cve": "CVE-2016-7157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7157"
}
],
"notes": [
{
"category": "general",
"text": "The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7157",
"url": "https://www.suse.com/security/cve/CVE-2016-7157"
},
{
"category": "external",
"summary": "SUSE Bug 997860 for CVE-2016-7157",
"url": "https://bugzilla.suse.com/997860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7157"
},
{
"cve": "CVE-2016-7161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7161"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7161",
"url": "https://www.suse.com/security/cve/CVE-2016-7161"
},
{
"category": "external",
"summary": "SUSE Bug 1001151 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001151"
},
{
"category": "external",
"summary": "SUSE Bug 1001152 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7161"
},
{
"cve": "CVE-2016-7170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7170"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7170",
"url": "https://www.suse.com/security/cve/CVE-2016-7170"
},
{
"category": "external",
"summary": "SUSE Bug 998516 for CVE-2016-7170",
"url": "https://bugzilla.suse.com/998516"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7170"
},
{
"cve": "CVE-2016-7421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7421"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7421",
"url": "https://www.suse.com/security/cve/CVE-2016-7421"
},
{
"category": "external",
"summary": "SUSE Bug 999661 for CVE-2016-7421",
"url": "https://bugzilla.suse.com/999661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-7421"
},
{
"cve": "CVE-2016-7422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7422"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7422",
"url": "https://www.suse.com/security/cve/CVE-2016-7422"
},
{
"category": "external",
"summary": "SUSE Bug 1000346 for CVE-2016-7422",
"url": "https://bugzilla.suse.com/1000346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7422"
},
{
"cve": "CVE-2016-7423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7423"
}
],
"notes": [
{
"category": "general",
"text": "The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7423",
"url": "https://www.suse.com/security/cve/CVE-2016-7423"
},
{
"category": "external",
"summary": "SUSE Bug 1000397 for CVE-2016-7423",
"url": "https://bugzilla.suse.com/1000397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7423"
},
{
"cve": "CVE-2016-7466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7466"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7466",
"url": "https://www.suse.com/security/cve/CVE-2016-7466"
},
{
"category": "external",
"summary": "SUSE Bug 1000345 for CVE-2016-7466",
"url": "https://bugzilla.suse.com/1000345"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7466"
},
{
"cve": "CVE-2016-7907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7907"
}
],
"notes": [
{
"category": "general",
"text": "The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7907",
"url": "https://www.suse.com/security/cve/CVE-2016-7907"
},
{
"category": "external",
"summary": "SUSE Bug 1002549 for CVE-2016-7907",
"url": "https://bugzilla.suse.com/1002549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7907"
},
{
"cve": "CVE-2016-7908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7908"
}
],
"notes": [
{
"category": "general",
"text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7908",
"url": "https://www.suse.com/security/cve/CVE-2016-7908"
},
{
"category": "external",
"summary": "SUSE Bug 1002550 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1002550"
},
{
"category": "external",
"summary": "SUSE Bug 1003030 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1003030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7908"
},
{
"cve": "CVE-2016-7909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7909"
}
],
"notes": [
{
"category": "general",
"text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7909",
"url": "https://www.suse.com/security/cve/CVE-2016-7909"
},
{
"category": "external",
"summary": "SUSE Bug 1002557 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1002557"
},
{
"category": "external",
"summary": "SUSE Bug 1003032 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1003032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7909"
},
{
"cve": "CVE-2016-7994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7994"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7994",
"url": "https://www.suse.com/security/cve/CVE-2016-7994"
},
{
"category": "external",
"summary": "SUSE Bug 1003613 for CVE-2016-7994",
"url": "https://bugzilla.suse.com/1003613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7994"
},
{
"cve": "CVE-2016-7995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7995"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7995",
"url": "https://www.suse.com/security/cve/CVE-2016-7995"
},
{
"category": "external",
"summary": "SUSE Bug 1003612 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003612"
},
{
"category": "external",
"summary": "SUSE Bug 1003870 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7995"
},
{
"cve": "CVE-2016-8576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8576"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8576",
"url": "https://www.suse.com/security/cve/CVE-2016-8576"
},
{
"category": "external",
"summary": "SUSE Bug 1003878 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1003878"
},
{
"category": "external",
"summary": "SUSE Bug 1004016 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1004016"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8576"
},
{
"cve": "CVE-2016-8577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8577"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8577",
"url": "https://www.suse.com/security/cve/CVE-2016-8577"
},
{
"category": "external",
"summary": "SUSE Bug 1003893 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1003893"
},
{
"category": "external",
"summary": "SUSE Bug 1004021 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1004021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8577"
},
{
"cve": "CVE-2016-8578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8578"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8578",
"url": "https://www.suse.com/security/cve/CVE-2016-8578"
},
{
"category": "external",
"summary": "SUSE Bug 1003894 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1003894"
},
{
"category": "external",
"summary": "SUSE Bug 1004023 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1004023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8578"
},
{
"cve": "CVE-2016-8667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8667"
}
],
"notes": [
{
"category": "general",
"text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8667",
"url": "https://www.suse.com/security/cve/CVE-2016-8667"
},
{
"category": "external",
"summary": "SUSE Bug 1004702 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1004702"
},
{
"category": "external",
"summary": "SUSE Bug 1005004 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1005004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8667"
},
{
"cve": "CVE-2016-8668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8668"
}
],
"notes": [
{
"category": "general",
"text": "The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8668",
"url": "https://www.suse.com/security/cve/CVE-2016-8668"
},
{
"category": "external",
"summary": "SUSE Bug 1004706 for CVE-2016-8668",
"url": "https://bugzilla.suse.com/1004706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8668"
},
{
"cve": "CVE-2016-8669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8669"
}
],
"notes": [
{
"category": "general",
"text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8669",
"url": "https://www.suse.com/security/cve/CVE-2016-8669"
},
{
"category": "external",
"summary": "SUSE Bug 1004707 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1004707"
},
{
"category": "external",
"summary": "SUSE Bug 1005005 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1005005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8669"
},
{
"cve": "CVE-2016-8909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8909"
}
],
"notes": [
{
"category": "general",
"text": "The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8909",
"url": "https://www.suse.com/security/cve/CVE-2016-8909"
},
{
"category": "external",
"summary": "SUSE Bug 1006536 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1006536"
},
{
"category": "external",
"summary": "SUSE Bug 1007160 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1007160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8909"
},
{
"cve": "CVE-2016-8910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8910"
}
],
"notes": [
{
"category": "general",
"text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8910",
"url": "https://www.suse.com/security/cve/CVE-2016-8910"
},
{
"category": "external",
"summary": "SUSE Bug 1006538 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1006538"
},
{
"category": "external",
"summary": "SUSE Bug 1007157 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1007157"
},
{
"category": "external",
"summary": "SUSE Bug 1024178 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1024178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8910"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9102"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9102",
"url": "https://www.suse.com/security/cve/CVE-2016-9102"
},
{
"category": "external",
"summary": "SUSE Bug 1007450 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1007450"
},
{
"category": "external",
"summary": "SUSE Bug 1014256 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1014256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9102"
},
{
"cve": "CVE-2016-9103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9103"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9103",
"url": "https://www.suse.com/security/cve/CVE-2016-9103"
},
{
"category": "external",
"summary": "SUSE Bug 1007454 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1007454"
},
{
"category": "external",
"summary": "SUSE Bug 1014259 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1014259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9103"
},
{
"cve": "CVE-2016-9104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9104"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9104",
"url": "https://www.suse.com/security/cve/CVE-2016-9104"
},
{
"category": "external",
"summary": "SUSE Bug 1007493 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1007493"
},
{
"category": "external",
"summary": "SUSE Bug 1014297 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1014297"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9104"
},
{
"cve": "CVE-2016-9105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9105"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9105",
"url": "https://www.suse.com/security/cve/CVE-2016-9105"
},
{
"category": "external",
"summary": "SUSE Bug 1007494 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1007494"
},
{
"category": "external",
"summary": "SUSE Bug 1014279 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1014279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9105"
},
{
"cve": "CVE-2016-9106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9106"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9106",
"url": "https://www.suse.com/security/cve/CVE-2016-9106"
},
{
"category": "external",
"summary": "SUSE Bug 1007495 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1007495"
},
{
"category": "external",
"summary": "SUSE Bug 1014299 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1014299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9106"
},
{
"cve": "CVE-2016-9602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9602"
}
],
"notes": [
{
"category": "general",
"text": "Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9602",
"url": "https://www.suse.com/security/cve/CVE-2016-9602"
},
{
"category": "external",
"summary": "SUSE Bug 1020427 for CVE-2016-9602",
"url": "https://bugzilla.suse.com/1020427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9602"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2017-10664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10664"
}
],
"notes": [
{
"category": "general",
"text": "qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10664",
"url": "https://www.suse.com/security/cve/CVE-2017-10664"
},
{
"category": "external",
"summary": "SUSE Bug 1046636 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046636"
},
{
"category": "external",
"summary": "SUSE Bug 1046637 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046637"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10664"
},
{
"cve": "CVE-2017-10806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10806"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10806",
"url": "https://www.suse.com/security/cve/CVE-2017-10806"
},
{
"category": "external",
"summary": "SUSE Bug 1047674 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047674"
},
{
"category": "external",
"summary": "SUSE Bug 1047675 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10806"
},
{
"cve": "CVE-2017-11334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11334"
}
],
"notes": [
{
"category": "general",
"text": "The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11334",
"url": "https://www.suse.com/security/cve/CVE-2017-11334"
},
{
"category": "external",
"summary": "SUSE Bug 1048902 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048902"
},
{
"category": "external",
"summary": "SUSE Bug 1048920 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-11334"
},
{
"cve": "CVE-2017-11434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11434"
}
],
"notes": [
{
"category": "general",
"text": "The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11434",
"url": "https://www.suse.com/security/cve/CVE-2017-11434"
},
{
"category": "external",
"summary": "SUSE Bug 1049381 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049381"
},
{
"category": "external",
"summary": "SUSE Bug 1049578 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049578"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-11434"
},
{
"cve": "CVE-2017-13673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13673"
}
],
"notes": [
{
"category": "general",
"text": "The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13673",
"url": "https://www.suse.com/security/cve/CVE-2017-13673"
},
{
"category": "external",
"summary": "SUSE Bug 1056386 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056386"
},
{
"category": "external",
"summary": "SUSE Bug 1056387 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056387"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13673"
},
{
"cve": "CVE-2017-13711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13711"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13711",
"url": "https://www.suse.com/security/cve/CVE-2017-13711"
},
{
"category": "external",
"summary": "SUSE Bug 1056291 for CVE-2017-13711",
"url": "https://bugzilla.suse.com/1056291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13711"
},
{
"cve": "CVE-2017-14167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14167"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14167",
"url": "https://www.suse.com/security/cve/CVE-2017-14167"
},
{
"category": "external",
"summary": "SUSE Bug 1057585 for CVE-2017-14167",
"url": "https://bugzilla.suse.com/1057585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-14167"
},
{
"cve": "CVE-2017-15038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15038"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15038",
"url": "https://www.suse.com/security/cve/CVE-2017-15038"
},
{
"category": "external",
"summary": "SUSE Bug 1062069 for CVE-2017-15038",
"url": "https://bugzilla.suse.com/1062069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15038"
},
{
"cve": "CVE-2017-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15118"
}
],
"notes": [
{
"category": "general",
"text": "A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15118",
"url": "https://www.suse.com/security/cve/CVE-2017-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1070147 for CVE-2017-15118",
"url": "https://bugzilla.suse.com/1070147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-15118"
},
{
"cve": "CVE-2017-15268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15268"
}
],
"notes": [
{
"category": "general",
"text": "Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15268",
"url": "https://www.suse.com/security/cve/CVE-2017-15268"
},
{
"category": "external",
"summary": "SUSE Bug 1062942 for CVE-2017-15268",
"url": "https://bugzilla.suse.com/1062942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15268"
},
{
"cve": "CVE-2017-15289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15289"
}
],
"notes": [
{
"category": "general",
"text": "The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15289",
"url": "https://www.suse.com/security/cve/CVE-2017-15289"
},
{
"category": "external",
"summary": "SUSE Bug 1063122 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063122"
},
{
"category": "external",
"summary": "SUSE Bug 1063123 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063123"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15289"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-2630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2630"
}
],
"notes": [
{
"category": "general",
"text": "A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server\u0027s response to a \u0027NBD_OPT_LIST\u0027 request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2630",
"url": "https://www.suse.com/security/cve/CVE-2017-2630"
},
{
"category": "external",
"summary": "SUSE Bug 1025396 for CVE-2017-2630",
"url": "https://bugzilla.suse.com/1025396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2630"
},
{
"cve": "CVE-2017-5525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5525"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5525",
"url": "https://www.suse.com/security/cve/CVE-2017-5525"
},
{
"category": "external",
"summary": "SUSE Bug 1020491 for CVE-2017-5525",
"url": "https://bugzilla.suse.com/1020491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5525"
},
{
"cve": "CVE-2017-5526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5526"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5526",
"url": "https://www.suse.com/security/cve/CVE-2017-5526"
},
{
"category": "external",
"summary": "SUSE Bug 1020589 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1020589"
},
{
"category": "external",
"summary": "SUSE Bug 1059777 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1059777"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5526"
},
{
"cve": "CVE-2017-5552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5552"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5552",
"url": "https://www.suse.com/security/cve/CVE-2017-5552"
},
{
"category": "external",
"summary": "SUSE Bug 1021195 for CVE-2017-5552",
"url": "https://bugzilla.suse.com/1021195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5552"
},
{
"cve": "CVE-2017-5578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5578"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5578",
"url": "https://www.suse.com/security/cve/CVE-2017-5578"
},
{
"category": "external",
"summary": "SUSE Bug 1021481 for CVE-2017-5578",
"url": "https://bugzilla.suse.com/1021481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5578"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5667"
}
],
"notes": [
{
"category": "general",
"text": "The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5667",
"url": "https://www.suse.com/security/cve/CVE-2017-5667"
},
{
"category": "external",
"summary": "SUSE Bug 1022541 for CVE-2017-5667",
"url": "https://bugzilla.suse.com/1022541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5667"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5857"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5857",
"url": "https://www.suse.com/security/cve/CVE-2017-5857"
},
{
"category": "external",
"summary": "SUSE Bug 1023073 for CVE-2017-5857",
"url": "https://bugzilla.suse.com/1023073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5857"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5973"
},
{
"cve": "CVE-2017-6058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6058"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6058",
"url": "https://www.suse.com/security/cve/CVE-2017-6058"
},
{
"category": "external",
"summary": "SUSE Bug 1025837 for CVE-2017-6058",
"url": "https://bugzilla.suse.com/1025837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-6058"
},
{
"cve": "CVE-2017-7471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7471"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7471",
"url": "https://www.suse.com/security/cve/CVE-2017-7471"
},
{
"category": "external",
"summary": "SUSE Bug 1034866 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034866"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7471"
},
{
"cve": "CVE-2017-7493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7493"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7493",
"url": "https://www.suse.com/security/cve/CVE-2017-7493"
},
{
"category": "external",
"summary": "SUSE Bug 1039495 for CVE-2017-7493",
"url": "https://bugzilla.suse.com/1039495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7493"
},
{
"cve": "CVE-2017-8112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8112"
}
],
"notes": [
{
"category": "general",
"text": "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8112",
"url": "https://www.suse.com/security/cve/CVE-2017-8112"
},
{
"category": "external",
"summary": "SUSE Bug 1036211 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036211"
},
{
"category": "external",
"summary": "SUSE Bug 1036470 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8112"
},
{
"cve": "CVE-2017-8309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8309"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8309",
"url": "https://www.suse.com/security/cve/CVE-2017-8309"
},
{
"category": "external",
"summary": "SUSE Bug 1037242 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037242"
},
{
"category": "external",
"summary": "SUSE Bug 1037243 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037243"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8309"
},
{
"cve": "CVE-2017-8379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8379"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8379",
"url": "https://www.suse.com/security/cve/CVE-2017-8379"
},
{
"category": "external",
"summary": "SUSE Bug 1037334 for CVE-2017-8379",
"url": "https://bugzilla.suse.com/1037334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8379"
},
{
"cve": "CVE-2017-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8380"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the \"megasas_mmio_write\" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8380",
"url": "https://www.suse.com/security/cve/CVE-2017-8380"
},
{
"category": "external",
"summary": "SUSE Bug 1037336 for CVE-2017-8380",
"url": "https://bugzilla.suse.com/1037336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8380"
},
{
"cve": "CVE-2017-9503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9503"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9503",
"url": "https://www.suse.com/security/cve/CVE-2017-9503"
},
{
"category": "external",
"summary": "SUSE Bug 1043296 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043296"
},
{
"category": "external",
"summary": "SUSE Bug 1043297 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043297"
},
{
"category": "external",
"summary": "SUSE Bug 1043312 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9503"
},
{
"cve": "CVE-2017-9524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9524"
}
],
"notes": [
{
"category": "general",
"text": "The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9524",
"url": "https://www.suse.com/security/cve/CVE-2017-9524"
},
{
"category": "external",
"summary": "SUSE Bug 1043808 for CVE-2017-9524",
"url": "https://bugzilla.suse.com/1043808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9524"
},
{
"cve": "CVE-2018-10839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10839"
}
],
"notes": [
{
"category": "general",
"text": "Qemu emulator \u003c= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10839",
"url": "https://www.suse.com/security/cve/CVE-2018-10839"
},
{
"category": "external",
"summary": "SUSE Bug 1110910 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110910"
},
{
"category": "external",
"summary": "SUSE Bug 1110924 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10839"
},
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-15746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15746"
}
],
"notes": [
{
"category": "general",
"text": "qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15746",
"url": "https://www.suse.com/security/cve/CVE-2018-15746"
},
{
"category": "external",
"summary": "SUSE Bug 1106222 for CVE-2018-15746",
"url": "https://bugzilla.suse.com/1106222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15746"
},
{
"cve": "CVE-2018-16872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16872"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn\u0027t consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16872",
"url": "https://www.suse.com/security/cve/CVE-2018-16872"
},
{
"category": "external",
"summary": "SUSE Bug 1119493 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119493"
},
{
"category": "external",
"summary": "SUSE Bug 1119494 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119494"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16872"
},
{
"cve": "CVE-2018-17963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17963"
}
],
"notes": [
{
"category": "general",
"text": "qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17963",
"url": "https://www.suse.com/security/cve/CVE-2018-17963"
},
{
"category": "external",
"summary": "SUSE Bug 1111013 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111013"
},
{
"category": "external",
"summary": "SUSE Bug 1111014 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111014"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-17963"
},
{
"cve": "CVE-2018-20123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20123"
}
],
"notes": [
{
"category": "general",
"text": "pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20123",
"url": "https://www.suse.com/security/cve/CVE-2018-20123"
},
{
"category": "external",
"summary": "SUSE Bug 1119437 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119437"
},
{
"category": "external",
"summary": "SUSE Bug 1119438 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20123"
},
{
"cve": "CVE-2018-20124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20124"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20124",
"url": "https://www.suse.com/security/cve/CVE-2018-20124"
},
{
"category": "external",
"summary": "SUSE Bug 1119840 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119840"
},
{
"category": "external",
"summary": "SUSE Bug 1119841 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20124"
},
{
"cve": "CVE-2018-20125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20125"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20125",
"url": "https://www.suse.com/security/cve/CVE-2018-20125"
},
{
"category": "external",
"summary": "SUSE Bug 1119989 for CVE-2018-20125",
"url": "https://bugzilla.suse.com/1119989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20125"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2018-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20191"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20191",
"url": "https://www.suse.com/security/cve/CVE-2018-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1119979 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119979"
},
{
"category": "external",
"summary": "SUSE Bug 1119980 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119980"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20191"
},
{
"cve": "CVE-2018-20216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20216"
}
],
"notes": [
{
"category": "general",
"text": "QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20216",
"url": "https://www.suse.com/security/cve/CVE-2018-20216"
},
{
"category": "external",
"summary": "SUSE Bug 1119984 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119984"
},
{
"category": "external",
"summary": "SUSE Bug 1119985 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20216"
},
{
"cve": "CVE-2018-20815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20815"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20815",
"url": "https://www.suse.com/security/cve/CVE-2018-20815"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1130675 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130675"
},
{
"category": "external",
"summary": "SUSE Bug 1130680 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130680"
},
{
"category": "external",
"summary": "SUSE Bug 1138043 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1138043"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20815"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-7858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7858"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7858",
"url": "https://www.suse.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2018-7858",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7858"
},
{
"cve": "CVE-2019-03812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-03812",
"url": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-03812"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-13164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13164"
}
],
"notes": [
{
"category": "general",
"text": "qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13164",
"url": "https://www.suse.com/security/cve/CVE-2019-13164"
},
{
"category": "external",
"summary": "SUSE Bug 1140402 for CVE-2019-13164",
"url": "https://bugzilla.suse.com/1140402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13164"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
},
{
"cve": "CVE-2019-6778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6778"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6778",
"url": "https://www.suse.com/security/cve/CVE-2019-6778"
},
{
"category": "external",
"summary": "SUSE Bug 1123156 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123156"
},
{
"category": "external",
"summary": "SUSE Bug 1123157 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123157"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6778"
},
{
"cve": "CVE-2019-8934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8934"
}
],
"notes": [
{
"category": "general",
"text": "hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8934",
"url": "https://www.suse.com/security/cve/CVE-2019-8934"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1126455 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1126455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-8934"
},
{
"cve": "CVE-2019-9824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9824"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9824",
"url": "https://www.suse.com/security/cve/CVE-2019-9824"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1129622 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129622"
},
{
"category": "external",
"summary": "SUSE Bug 1129623 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129623"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9824"
},
{
"cve": "CVE-2020-10702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10702"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10702",
"url": "https://www.suse.com/security/cve/CVE-2020-10702"
},
{
"category": "external",
"summary": "SUSE Bug 1168681 for CVE-2020-10702",
"url": "https://bugzilla.suse.com/1168681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10702"
},
{
"cve": "CVE-2020-10717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10717"
}
],
"notes": [
{
"category": "general",
"text": "A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version \u003e= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10717",
"url": "https://www.suse.com/security/cve/CVE-2020-10717"
},
{
"category": "external",
"summary": "SUSE Bug 1171110 for CVE-2020-10717",
"url": "https://bugzilla.suse.com/1171110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-10717"
},
{
"cve": "CVE-2020-10761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10761"
}
],
"notes": [
{
"category": "general",
"text": "An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10761",
"url": "https://www.suse.com/security/cve/CVE-2020-10761"
},
{
"category": "external",
"summary": "SUSE Bug 1172710 for CVE-2020-10761",
"url": "https://bugzilla.suse.com/1172710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10761"
},
{
"cve": "CVE-2020-11102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11102"
}
],
"notes": [
{
"category": "general",
"text": "hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11102",
"url": "https://www.suse.com/security/cve/CVE-2020-11102"
},
{
"category": "external",
"summary": "SUSE Bug 1168713 for CVE-2020-11102",
"url": "https://bugzilla.suse.com/1168713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-11102"
},
{
"cve": "CVE-2020-11869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11869"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11869",
"url": "https://www.suse.com/security/cve/CVE-2020-11869"
},
{
"category": "external",
"summary": "SUSE Bug 1170537 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1170537"
},
{
"category": "external",
"summary": "SUSE Bug 1188609 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1188609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-11869"
},
{
"cve": "CVE-2020-13361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13361"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13361",
"url": "https://www.suse.com/security/cve/CVE-2020-13361"
},
{
"category": "external",
"summary": "SUSE Bug 1172384 for CVE-2020-13361",
"url": "https://bugzilla.suse.com/1172384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13361"
},
{
"cve": "CVE-2020-13362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13362"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13362",
"url": "https://www.suse.com/security/cve/CVE-2020-13362"
},
{
"category": "external",
"summary": "SUSE Bug 1172383 for CVE-2020-13362",
"url": "https://bugzilla.suse.com/1172383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13362"
},
{
"cve": "CVE-2020-13659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13659"
}
],
"notes": [
{
"category": "general",
"text": "address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13659",
"url": "https://www.suse.com/security/cve/CVE-2020-13659"
},
{
"category": "external",
"summary": "SUSE Bug 1172386 for CVE-2020-13659",
"url": "https://bugzilla.suse.com/1172386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13659"
},
{
"cve": "CVE-2020-13800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13800"
}
],
"notes": [
{
"category": "general",
"text": "ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13800",
"url": "https://www.suse.com/security/cve/CVE-2020-13800"
},
{
"category": "external",
"summary": "SUSE Bug 1172495 for CVE-2020-13800",
"url": "https://bugzilla.suse.com/1172495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13800"
},
{
"cve": "CVE-2020-14364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14364"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14364",
"url": "https://www.suse.com/security/cve/CVE-2020-14364"
},
{
"category": "external",
"summary": "SUSE Bug 1175441 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175441"
},
{
"category": "external",
"summary": "SUSE Bug 1175534 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175534"
},
{
"category": "external",
"summary": "SUSE Bug 1176494 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1176494"
},
{
"category": "external",
"summary": "SUSE Bug 1177130 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1177130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14364"
},
{
"cve": "CVE-2020-16092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16092"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16092",
"url": "https://www.suse.com/security/cve/CVE-2020-16092"
},
{
"category": "external",
"summary": "SUSE Bug 1174641 for CVE-2020-16092",
"url": "https://bugzilla.suse.com/1174641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16092"
},
{
"cve": "CVE-2020-1711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1711"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1711",
"url": "https://www.suse.com/security/cve/CVE-2020-1711"
},
{
"category": "external",
"summary": "SUSE Bug 1166240 for CVE-2020-1711",
"url": "https://bugzilla.suse.com/1166240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1711"
},
{
"cve": "CVE-2020-17380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-17380"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-17380",
"url": "https://www.suse.com/security/cve/CVE-2020-17380"
},
{
"category": "external",
"summary": "SUSE Bug 1175144 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1175144"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-17380"
},
{
"cve": "CVE-2020-1983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1983"
}
],
"notes": [
{
"category": "general",
"text": "A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1983",
"url": "https://www.suse.com/security/cve/CVE-2020-1983"
},
{
"category": "external",
"summary": "SUSE Bug 1170940 for CVE-2020-1983",
"url": "https://bugzilla.suse.com/1170940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1983"
},
{
"cve": "CVE-2020-25085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25085"
}
],
"notes": [
{
"category": "general",
"text": "QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25085",
"url": "https://www.suse.com/security/cve/CVE-2020-25085"
},
{
"category": "external",
"summary": "SUSE Bug 1176681 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1176681"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25085"
},
{
"cve": "CVE-2020-25723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25723"
}
],
"notes": [
{
"category": "general",
"text": "A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25723",
"url": "https://www.suse.com/security/cve/CVE-2020-25723"
},
{
"category": "external",
"summary": "SUSE Bug 1178934 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178934"
},
{
"category": "external",
"summary": "SUSE Bug 1178935 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-25723"
},
{
"cve": "CVE-2020-27821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27821"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27821",
"url": "https://www.suse.com/security/cve/CVE-2020-27821"
},
{
"category": "external",
"summary": "SUSE Bug 1179686 for CVE-2020-27821",
"url": "https://bugzilla.suse.com/1179686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-27821"
},
{
"cve": "CVE-2020-29129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29129"
}
],
"notes": [
{
"category": "general",
"text": "ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29129",
"url": "https://www.suse.com/security/cve/CVE-2020-29129"
},
{
"category": "external",
"summary": "SUSE Bug 1179466 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179466"
},
{
"category": "external",
"summary": "SUSE Bug 1179467 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179467"
},
{
"category": "external",
"summary": "SUSE Bug 1179477 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179477"
},
{
"category": "external",
"summary": "SUSE Bug 1179484 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29129"
},
{
"cve": "CVE-2020-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7039"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7039",
"url": "https://www.suse.com/security/cve/CVE-2020-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1161066 for CVE-2020-7039",
"url": "https://bugzilla.suse.com/1161066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-7039"
},
{
"cve": "CVE-2020-8608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8608"
}
],
"notes": [
{
"category": "general",
"text": "In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8608",
"url": "https://www.suse.com/security/cve/CVE-2020-8608"
},
{
"category": "external",
"summary": "SUSE Bug 1163018 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163018"
},
{
"category": "external",
"summary": "SUSE Bug 1163019 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-8608"
},
{
"cve": "CVE-2021-20181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20181"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20181",
"url": "https://www.suse.com/security/cve/CVE-2021-20181"
},
{
"category": "external",
"summary": "SUSE Bug 1182137 for CVE-2021-20181",
"url": "https://bugzilla.suse.com/1182137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-20181"
},
{
"cve": "CVE-2021-20203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20203"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20203",
"url": "https://www.suse.com/security/cve/CVE-2021-20203"
},
{
"category": "external",
"summary": "SUSE Bug 1181639 for CVE-2021-20203",
"url": "https://bugzilla.suse.com/1181639"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20203"
},
{
"cve": "CVE-2021-20221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20221"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20221",
"url": "https://www.suse.com/security/cve/CVE-2021-20221"
},
{
"category": "external",
"summary": "SUSE Bug 1181933 for CVE-2021-20221",
"url": "https://bugzilla.suse.com/1181933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20221"
},
{
"cve": "CVE-2021-20257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20257"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20257",
"url": "https://www.suse.com/security/cve/CVE-2021-20257"
},
{
"category": "external",
"summary": "SUSE Bug 1182577 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182577"
},
{
"category": "external",
"summary": "SUSE Bug 1182846 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20257"
},
{
"cve": "CVE-2021-20263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20263"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new \u0027xattrmap\u0027 option may cause the \u0027security.capability\u0027 xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20263",
"url": "https://www.suse.com/security/cve/CVE-2021-20263"
},
{
"category": "external",
"summary": "SUSE Bug 1183373 for CVE-2021-20263",
"url": "https://bugzilla.suse.com/1183373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20263"
},
{
"cve": "CVE-2021-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3416"
}
],
"notes": [
{
"category": "general",
"text": "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3416",
"url": "https://www.suse.com/security/cve/CVE-2021-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1182968 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1182968"
},
{
"category": "external",
"summary": "SUSE Bug 1186473 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1186473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3416"
},
{
"cve": "CVE-2021-3527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3527"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3527",
"url": "https://www.suse.com/security/cve/CVE-2021-3527"
},
{
"category": "external",
"summary": "SUSE Bug 1186012 for CVE-2021-3527",
"url": "https://bugzilla.suse.com/1186012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3527"
},
{
"cve": "CVE-2021-3544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3544"
}
],
"notes": [
{
"category": "general",
"text": "Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3544",
"url": "https://www.suse.com/security/cve/CVE-2021-3544"
},
{
"category": "external",
"summary": "SUSE Bug 1186010 for CVE-2021-3544",
"url": "https://bugzilla.suse.com/1186010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3544"
},
{
"cve": "CVE-2021-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3545"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3545",
"url": "https://www.suse.com/security/cve/CVE-2021-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1185990 for CVE-2021-3545",
"url": "https://bugzilla.suse.com/1185990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3545"
},
{
"cve": "CVE-2021-3546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3546"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the \u0027VIRTIO_GPU_CMD_GET_CAPSET\u0027 command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3546",
"url": "https://www.suse.com/security/cve/CVE-2021-3546"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2021-3546",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3546"
},
{
"cve": "CVE-2021-3582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3582"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device. The issue occurs while handling a \"PVRDMA_CMD_CREATE_MR\" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3582",
"url": "https://www.suse.com/security/cve/CVE-2021-3582"
},
{
"category": "external",
"summary": "SUSE Bug 1187499 for CVE-2021-3582",
"url": "https://bugzilla.suse.com/1187499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3582"
},
{
"cve": "CVE-2021-3607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3607"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3607",
"url": "https://www.suse.com/security/cve/CVE-2021-3607"
},
{
"category": "external",
"summary": "SUSE Bug 1187539 for CVE-2021-3607",
"url": "https://bugzilla.suse.com/1187539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3607"
},
{
"cve": "CVE-2021-3608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3608"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3608",
"url": "https://www.suse.com/security/cve/CVE-2021-3608"
},
{
"category": "external",
"summary": "SUSE Bug 1187538 for CVE-2021-3608",
"url": "https://bugzilla.suse.com/1187538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3608"
},
{
"cve": "CVE-2021-3682",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3682"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3682",
"url": "https://www.suse.com/security/cve/CVE-2021-3682"
},
{
"category": "external",
"summary": "SUSE Bug 1189145 for CVE-2021-3682",
"url": "https://bugzilla.suse.com/1189145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3682"
}
]
}
CNVD-2018-13391
Vulnerability from cnvd - Published: 2018-07-18厂商已发布漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
| Name | ['ARM Cortex A57', 'Intel 5th generation Core Processors 无', 'ARM Cortex A72', 'Intel 6th generation Core processors 0', 'Intel 5th generation Core processors 0', 'Intel 4th generation Core processors 0', 'Intel 3rd generation Core processors 0', 'Intel 2nd generation Core processors 0', 'Intel 8th generation Core processors 0', 'Intel 7th generation Core processors 0', 'Intel Atom Processor A Series 0', 'Intel Atom Processor C Series 0', 'Intel Atom Processor E Series 0', 'Intel Atom Processor T Series 0', 'Intel Atom Processor X Series 0', 'Intel Atom Processor Z Series 0', 'Intel Core X-series Processor Family for Intel X99 platforms 0', 'Intel Celeron Processor J Series 0', 'Intel Celeron Processor N Series 0', 'Intel Core M processor family 0', 'Intel Core X-series Processor Family for Intel X299 platforms 0', 'Intel Pentium Processor N Series 0', 'Intel Pentium Processor Silver Series 0', 'Intel Xeon processor 3400 series 0', 'Intel Xeon processor 3600 series 0', 'Intel Xeon processor 5500 series 0', 'Intel Xeon processor 5600 series 0', 'Intel Xeon processor 7500 series 0', 'Intel Xeon processor 6500 series 0', 'Intel Pentium Processor J Series 0', 'Intel Xeon Processor E3 Family 0', 'Intel Xeon Processor E3 v2 Family 0', 'Intel Xeon Processor E3 v3 Family 0', 'Intel Xeon Processor E3 v4 Family 0', 'Intel Xeon Processor E3 v5 Family 0', 'Intel Xeon Processor E3 v6 Family 0', 'Intel Xeon Processor E5 Family 0', 'Intel Xeon Processor E5 v2 Family 0', 'Intel Xeon Processor E5 v3 Family 0', 'Intel Xeon Processor E5 v4 Family 0', 'Intel Xeon Processor E7 Family 0', 'Intel Xeon Processor E7 v2 Family 0', 'Intel Xeon Processor E7 v3 Family 0', 'Intel Xeon Processor E7 v4 Family 0'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "104232"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-3639"
}
},
"description": "CPU hardware\u662f\u8fd0\u884c\u5728\u4e2d\u592e\u5904\u7406\u5668\u4e2d\u7528\u4e8e\u7ba1\u7406\u548c\u63a7\u5236CPU\u7684\u56fa\u4ef6\u3002\r\n\r\n\u591a\u6b3eCPU Hardware\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fCPU\u9ad8\u901f\u7f13\u5b58\u5904\u7406\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u4fa7\u4fe1\u9053\u5206\u6790\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "Ken Johnson of Microsoft Corporation and Jann Horn of Google Project Zero",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-13391",
"openTime": "2018-07-18",
"patchDescription": "CPU hardware\u662f\u8fd0\u884c\u5728\u4e2d\u592e\u5904\u7406\u5668\u4e2d\u7528\u4e8e\u7ba1\u7406\u548c\u63a7\u5236CPU\u7684\u56fa\u4ef6\u3002\r\n\r\n\u591a\u6b3eCPU Hardware\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u4ea7\u751f\u7684\u539f\u56e0\u662fCPU\u9ad8\u901f\u7f13\u5b58\u5904\u7406\u5b58\u5728\u7ade\u4e89\u6761\u4ef6\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6f0f\u6d1e\u901a\u8fc7\u4fa7\u4fe1\u9053\u5206\u6790\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eCPU Hardware\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"ARM Cortex A57",
"Intel 5th generation Core Processors \u65e0",
"ARM Cortex A72",
"Intel 6th generation Core processors 0",
"Intel 5th generation Core processors 0",
"Intel 4th generation Core processors 0",
"Intel 3rd generation Core processors 0",
"Intel 2nd generation Core processors 0",
"Intel 8th generation Core processors 0",
"Intel 7th generation Core processors 0",
"Intel Atom Processor A Series 0",
"Intel Atom Processor C Series 0",
"Intel Atom Processor E Series 0",
"Intel Atom Processor T Series 0",
"Intel Atom Processor X Series 0",
"Intel Atom Processor Z Series 0",
"Intel Core X-series Processor Family for Intel X99 platforms 0",
"Intel Celeron Processor J Series 0",
"Intel Celeron Processor N Series 0",
"Intel Core M processor family 0",
"Intel Core X-series Processor Family for Intel X299 platforms 0",
"Intel Pentium Processor N Series 0",
"Intel Pentium Processor Silver Series 0",
"Intel Xeon processor 3400 series 0",
"Intel Xeon processor 3600 series 0",
"Intel Xeon processor 5500 series 0",
"Intel Xeon processor 5600 series 0",
"Intel Xeon processor 7500 series 0",
"Intel Xeon processor 6500 series 0",
"Intel Pentium Processor J Series 0",
"Intel Xeon Processor E3 Family 0",
"Intel Xeon Processor E3 v2 Family 0",
"Intel Xeon Processor E3 v3 Family 0",
"Intel Xeon Processor E3 v4 Family 0",
"Intel Xeon Processor E3 v5 Family 0",
"Intel Xeon Processor E3 v6 Family 0",
"Intel Xeon Processor E5 Family 0",
"Intel Xeon Processor E5 v2 Family 0",
"Intel Xeon Processor E5 v3 Family 0",
"Intel Xeon Processor E5 v4 Family 0",
"Intel Xeon Processor E7 Family 0",
"Intel Xeon Processor E7 v2 Family 0",
"Intel Xeon Processor E7 v3 Family 0",
"Intel Xeon Processor E7 v4 Family 0"
]
},
"referenceLink": "https://securitytracker.com/id/1040949",
"serverity": "\u4e2d",
"submitTime": "2018-05-22",
"title": "\u591a\u6b3eCPU Hardware\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
SUSE-SU-2018:1699-1
Vulnerability from csaf_suse - Published: 2018-06-15 12:42 - Updated: 2018-06-15 12:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThis feature was added:\n\n- Added support for qemu monitor command \n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nThis non-security issue was fixed:\n\n- bsc#1086039 - Dom0 does not represent DomU cpu flags\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1142,SUSE-SLE-SAP-12-SP2-2018-1142,SUSE-SLE-SERVER-12-SP2-2018-1142,SUSE-Storage-4-2018-1142",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1699-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1699-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181699-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1699-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1086039",
"url": "https://bugzilla.suse.com/1086039"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-15T12:42:33Z",
"generator": {
"date": "2018-06-15T12:42:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1699-1",
"initial_release_date": "2018-06-15T12:42:33Z",
"revision_history": [
{
"date": "2018-06-15T12:42:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-doc-html-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-domU-4.7.5_04-43.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Enterprise Storage 4:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE OpenStack Cloud 7:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-15T12:42:33Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:3064-3
Vulnerability from csaf_suse - Published: 2019-04-27 14:50 - Updated: 2019-04-27 14:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated\n attacker with network access via multiple protocols to compromise Java SE.\n Successful attacks of this vulnerability can result in takeover of Java SE\n (bsc#1101644).\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1101645)\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1101651)\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1101656)\n\nThese non-security issues were fixed:\n\n- Improve desktop file usage\n- Better Internet address support\n- speculative traps break when classes are redefined\n- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently\n- Clean up code that saves the previous versions of redefined classes\n- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links\n- RedefineClasses() tests fail assert(((Metadata*)obj)-\u003eis_valid()) failed: obj is valid\n- NMT is not enabled if NMT option is specified after class path specifiers\n- EndEntityChecker should not process custom extensions after PKIX validation\n- SupportedDSAParamGen.java failed with timeout\n- Montgomery multiply intrinsic should use correct name\n- When determining the ciphersuite lists, there is no debug output for disabled suites.\n- sun/security/mscapi/SignedObjectChain.java fails on Windows\n- On Windows Swing changes keyboard layout on a window activation\n- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj\n- Even better Internet address support\n- Newlines in JAXB string values of SOAP-requests are escaped to \u0027\u0026#xa;\u0027\n- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException\n- Unable to use JDWP API in JDK 8 to debug JDK 9 VM\n- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3\n- Performance drop with Java JDK 1.8.0_162-b32\n- Upgrade time-zone data to tzdata2018d\n- Fix potential crash in BufImg_SetupICM\n- JDK 8u181 l10n resource file update\n- Remove debug print statements from RMI fix\n- (tz) Upgrade time-zone data to tzdata2018e\n- ObjectInputStream filterCheck method throws NullPointerException\n- adjust reflective access checks\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2019-1070",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3064-3.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3064-3",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-3/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3064-3",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101644",
"url": "https://bugzilla.suse.com/1101644"
},
{
"category": "self",
"summary": "SUSE Bug 1101645",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "self",
"summary": "SUSE Bug 1101651",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "self",
"summary": "SUSE Bug 1101656",
"url": "https://bugzilla.suse.com/1101656"
},
{
"category": "self",
"summary": "SUSE Bug 1106812",
"url": "https://bugzilla.suse.com/1106812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2019-04-27T14:50:46Z",
"generator": {
"date": "2019-04-27T14:50:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3064-3",
"initial_release_date": "2019-04-27T14:50:46Z",
"revision_history": [
{
"date": "2019-04-27T14:50:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-27T14:50:46Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-27T14:50:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-27T14:50:46Z",
"details": "important"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-27T14:50:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-27T14:50:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2082-1
Vulnerability from csaf_suse - Published: 2018-07-27 10:50 - Updated: 2018-07-27 10:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2017-5715: Fixes for speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n- CVE-2018-3639: Add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits to address V4 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092885).\n- CVE-2018-1064: Fix denial of service problem during reading from guest agent (bsc#1083625).\n- CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method (bsc#1076500).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1417,SUSE-SLE-SERVER-12-SP1-2018-1417",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2082-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2082-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2082-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-07-27T10:50:13Z",
"generator": {
"date": "2018-07-27T10:50:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2082-1",
"initial_release_date": "2018-07-27T10:50:13Z",
"revision_history": [
{
"date": "2018-07-27T10:50:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-client-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-client-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-client-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-doc-1.2.18.4-22.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-client-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-client-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-config-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-interface-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-libxl-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-network-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nodedev-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-nwfilter-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-secret-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-driver-storage-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-lxc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-qemu-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-daemon-xen-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-doc-1.2.18.4-22.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:libvirt-lock-sanlock-1.2.18.4-22.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T10:50:13Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:1926-1
Vulnerability from csaf_suse - Published: 2018-07-11 13:55 - Updated: 2018-07-11 13:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for ucode-intel fixes the following issues:\n\nThe microcode bundles was updated to the 20180703 release\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)\nand helps mitigating CVE-2018-3639 (Spectre v4) (bsc#1100147 bsc#1087082 bsc#1087083).\n\nMore information on:\n https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File\n\nFollowing chipsets are fixed in this round:\n\nModel Stepping F-MO-S/PI Old-\u003eNew\n\n---- updated platforms ------------------------------------\n\nSNB-EP C1 6-2d-6/6d 0000061c-\u003e0000061d Xeon E5\nSNB-EP C2 6-2d-7/6d 00000713-\u003e00000714 Xeon E5\nIVT C0 6-3e-4/ed 0000042c-\u003e0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K\nIVT D1 6-3e-7/ed 00000713-\u003e00000714 Xeon E5 v2\nHSX-E/EP/4S C0 6-3f-2/6f 0000003c-\u003e0000003d Xeon E5 v3\nHSX-EX E0 6-3f-4/80 00000011-\u003e00000012 Xeon E7 v3\nSKX-SP/D/W/X H0 6-55-4/b7 02000043-\u003e0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX\nBDX-DE A1 6-56-5/10 0e000009-\u003e0e00000a Xeon D-15x3N\nBDX-ML B/M/R0 6-4f-1/ef 0b00002c-\u003e0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1299",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1926-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1926-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181926-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1926-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1100147",
"url": "https://bugzilla.suse.com/1100147"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
}
],
"title": "Security update for ucode-intel",
"tracking": {
"current_release_date": "2018-07-11T13:55:21Z",
"generator": {
"date": "2018-07-11T13:55:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1926-1",
"initial_release_date": "2018-07-11T13:55:21Z",
"revision_history": [
{
"date": "2018-07-11T13:55:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180703-3.3.1.x86_64",
"product": {
"name": "ucode-intel-20180703-3.3.1.x86_64",
"product_id": "ucode-intel-20180703-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
},
"product_reference": "ucode-intel-20180703-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-11T13:55:21Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180703-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-11T13:55:21Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
}
]
}
SUSE-SU-2021:3007-1
Vulnerability from csaf_suse - Published: 2021-09-09 13:22 - Updated: 2021-09-09 13:22Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_7_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_7_0-openjdk fixes the following issues:\n\n- Update to 2.6.27 - OpenJDK 7u311 (July 2021 CPU)\n\nSecurity fixes:\n\n- CVE-2021-2341: Improve file transfers (bsc#1188564)\n- CVE-2021-2369: Better jar file validation (bsc#1188565)\n- CVE-2021-2432: Provide better LDAP provider support (bsc#1188568)\n- CVE-2021-2163: Enhance opening JARs (bsc#1185055)\n- CVE-2021-2161: Less ambiguous processing (bsc#1185056)\n- CVE-2018-3639: Fix revision to prefer\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3007,SUSE-SLE-SERVER-12-SP5-2021-3007",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3007-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3007-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213007-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3007-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185055",
"url": "https://bugzilla.suse.com/1185055"
},
{
"category": "self",
"summary": "SUSE Bug 1185056",
"url": "https://bugzilla.suse.com/1185056"
},
{
"category": "self",
"summary": "SUSE Bug 1188564",
"url": "https://bugzilla.suse.com/1188564"
},
{
"category": "self",
"summary": "SUSE Bug 1188565",
"url": "https://bugzilla.suse.com/1188565"
},
{
"category": "self",
"summary": "SUSE Bug 1188568",
"url": "https://bugzilla.suse.com/1188568"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2161 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2163 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2369 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-2432 page",
"url": "https://www.suse.com/security/cve/CVE-2021-2432/"
}
],
"title": "Security update for java-1_7_0-openjdk",
"tracking": {
"current_release_date": "2021-09-09T13:22:06Z",
"generator": {
"date": "2021-09-09T13:22:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3007-1",
"initial_release_date": "2021-09-09T13:22:06Z",
"revision_history": [
{
"date": "2021-09-09T13:22:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch",
"product": {
"name": "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch",
"product_id": "java-1_7_0-openjdk-javadoc-1.7.0.311-43.50.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.311-43.50.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2021-2161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2161"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2161",
"url": "https://www.suse.com/security/cve/CVE-2021-2161"
},
{
"category": "external",
"summary": "SUSE Bug 1185056 for CVE-2021-2161",
"url": "https://bugzilla.suse.com/1185056"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-2161"
},
{
"cve": "CVE-2021-2163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2163"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2163",
"url": "https://www.suse.com/security/cve/CVE-2021-2163"
},
{
"category": "external",
"summary": "SUSE Bug 1185055 for CVE-2021-2163",
"url": "https://bugzilla.suse.com/1185055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-2163"
},
{
"cve": "CVE-2021-2341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2341"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2341",
"url": "https://www.suse.com/security/cve/CVE-2021-2341"
},
{
"category": "external",
"summary": "SUSE Bug 1188564 for CVE-2021-2341",
"url": "https://bugzilla.suse.com/1188564"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-2341"
},
{
"cve": "CVE-2021-2369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2369"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2369",
"url": "https://www.suse.com/security/cve/CVE-2021-2369"
},
{
"category": "external",
"summary": "SUSE Bug 1188565 for CVE-2021-2369",
"url": "https://bugzilla.suse.com/1188565"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-2369"
},
{
"cve": "CVE-2021-2432",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-2432"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE product of Oracle Java SE (component: JNDI). The supported version that is affected is Java SE: 7u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-2432",
"url": "https://www.suse.com/security/cve/CVE-2021-2432"
},
{
"category": "external",
"summary": "SUSE Bug 1188568 for CVE-2021-2432",
"url": "https://bugzilla.suse.com/1188568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.311-43.50.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.311-43.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-09T13:22:06Z",
"details": "low"
}
],
"title": "CVE-2021-2432"
}
]
}
SUSE-SU-2018:2615-1
Vulnerability from csaf_suse - Published: 2018-09-04 16:45 - Updated: 2018-09-04 16:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kvm fixes the following security issues:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS\n (bsc#1098735)\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kvm-13767,slessp3-kvm-13767",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2615-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2615-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182615-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2615-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-09-04T16:45:15Z",
"generator": {
"date": "2018-09-04T16:45:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2615-1",
"initial_release_date": "2018-09-04T16:45:15Z",
"revision_history": [
{
"date": "2018-09-04T16:45:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.23.2.i586",
"product": {
"name": "kvm-1.4.2-53.23.2.i586",
"product_id": "kvm-1.4.2-53.23.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.23.2.s390x",
"product": {
"name": "kvm-1.4.2-53.23.2.s390x",
"product_id": "kvm-1.4.2-53.23.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.23.2.x86_64",
"product": {
"name": "kvm-1.4.2-53.23.2.x86_64",
"product_id": "kvm-1.4.2-53.23.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586"
},
"product_reference": "kvm-1.4.2-53.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586"
},
"product_reference": "kvm-1.4.2-53.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x"
},
"product_reference": "kvm-1.4.2-53.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64"
},
"product_reference": "kvm-1.4.2-53.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586"
},
"product_reference": "kvm-1.4.2-53.23.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x"
},
"product_reference": "kvm-1.4.2-53.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.23.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
},
"product_reference": "kvm-1.4.2-53.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-04T16:45:15Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-04T16:45:15Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.23.2.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-04T16:45:15Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2019:0049-1
Vulnerability from csaf_suse - Published: 2019-01-09 16:26 - Updated: 2019-01-09 16:26Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_7_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-3136: Manifest better support (bsc#1112142)\n- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)\n- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)\n- CVE-2018-3169: Improve field accesses (bsc#1112146)\n- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)\n- CVE-2018-3214: Better RIFF reading support (bsc#1112152)\n- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)\n- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile\n- CVE-2018-2938: Support Derby connections (bsc#1101644)\n- CVE-2018-2940: Better stack walking (bsc#1101645)\n- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)\n- CVE-2018-2973: Improve LDAP support (bsc#1101656)\n- CVE-2018-3639 cpu speculative store bypass mitigation\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-49,SUSE-OpenStack-Cloud-7-2019-49,SUSE-SLE-DESKTOP-12-SP3-2019-49,SUSE-SLE-DESKTOP-12-SP4-2019-49,SUSE-SLE-SAP-12-SP2-2019-49,SUSE-SLE-SERVER-12-2019-49,SUSE-SLE-SERVER-12-SP1-2019-49,SUSE-SLE-SERVER-12-SP2-2019-49,SUSE-SLE-SERVER-12-SP2-BCL-2019-49,SUSE-SLE-SERVER-12-SP3-2019-49,SUSE-SLE-SERVER-12-SP4-2019-49,SUSE-Storage-4-2019-49",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0049-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:0049-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:0049-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101644",
"url": "https://bugzilla.suse.com/1101644"
},
{
"category": "self",
"summary": "SUSE Bug 1101645",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "self",
"summary": "SUSE Bug 1101651",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "self",
"summary": "SUSE Bug 1101656",
"url": "https://bugzilla.suse.com/1101656"
},
{
"category": "self",
"summary": "SUSE Bug 1112142",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "self",
"summary": "SUSE Bug 1112143",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "self",
"summary": "SUSE Bug 1112144",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "self",
"summary": "SUSE Bug 1112146",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "self",
"summary": "SUSE Bug 1112147",
"url": "https://bugzilla.suse.com/1112147"
},
{
"category": "self",
"summary": "SUSE Bug 1112152",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "self",
"summary": "SUSE Bug 1112153",
"url": "https://bugzilla.suse.com/1112153"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13785 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16435 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3136 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3139 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3149 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3180 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3214 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for java-1_7_0-openjdk",
"tracking": {
"current_release_date": "2019-01-09T16:26:14Z",
"generator": {
"date": "2019-01-09T16:26:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:0049-1",
"initial_release_date": "2019-01-09T16:26:14Z",
"revision_history": [
{
"date": "2019-01-09T16:26:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch",
"product": {
"name": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch",
"product_id": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-13785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13785"
}
],
"notes": [
{
"category": "general",
"text": "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13785",
"url": "https://www.suse.com/security/cve/CVE-2018-13785"
},
{
"category": "external",
"summary": "SUSE Bug 1100687 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1100687"
},
{
"category": "external",
"summary": "SUSE Bug 1112153 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1112153"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "low"
}
],
"title": "CVE-2018-13785"
},
{
"cve": "CVE-2018-16435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16435"
}
],
"notes": [
{
"category": "general",
"text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16435",
"url": "https://www.suse.com/security/cve/CVE-2018-16435"
},
{
"category": "external",
"summary": "SUSE Bug 1108813 for CVE-2018-16435",
"url": "https://bugzilla.suse.com/1108813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-16435"
},
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "important"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3136"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3136",
"url": "https://www.suse.com/security/cve/CVE-2018-3136"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3136"
},
{
"cve": "CVE-2018-3139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3139"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3139",
"url": "https://www.suse.com/security/cve/CVE-2018-3139"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3139"
},
{
"cve": "CVE-2018-3149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3149"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3149",
"url": "https://www.suse.com/security/cve/CVE-2018-3149"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3149"
},
{
"cve": "CVE-2018-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3169"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3169",
"url": "https://www.suse.com/security/cve/CVE-2018-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3169"
},
{
"cve": "CVE-2018-3180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3180"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3180",
"url": "https://www.suse.com/security/cve/CVE-2018-3180"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112147 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112147"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3180"
},
{
"cve": "CVE-2018-3214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3214"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3214",
"url": "https://www.suse.com/security/cve/CVE-2018-3214"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3214"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-09T16:26:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2565-1
Vulnerability from csaf_suse - Published: 2018-08-30 18:20 - Updated: 2018-08-30 18:20Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\nbeen exploited by sending a crafted QMP command (including guest-file-read with\na large count value) to the agent via the listening socket causing DoS\n(bsc#1098735)\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\ndatagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n\nThis non-security was fixed:\n\n- Fix VirtQueue error for virtio-balloon during live migration (bsc#1020928).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1801,SUSE-SLE-SERVER-12-SP1-2018-1801",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2565-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2565-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182565-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2565-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html"
},
{
"category": "self",
"summary": "SUSE Bug 1020928",
"url": "https://bugzilla.suse.com/1020928"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-08-30T18:20:27Z",
"generator": {
"date": "2018-08-30T18:20:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2565-1",
"initial_release_date": "2018-08-30T18:20:27Z",
"revision_history": [
{
"date": "2018-08-30T18:20:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-33.12.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-33.12.1.noarch",
"product_id": "qemu-ipxe-1.0.0-33.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.8.1-33.12.1.noarch",
"product": {
"name": "qemu-seabios-1.8.1-33.12.1.noarch",
"product_id": "qemu-seabios-1.8.1-33.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-33.12.1.noarch",
"product": {
"name": "qemu-sgabios-8-33.12.1.noarch",
"product_id": "qemu-sgabios-8-33.12.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.8.1-33.12.1.noarch",
"product": {
"name": "qemu-vgabios-1.8.1-33.12.1.noarch",
"product_id": "qemu-vgabios-1.8.1-33.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-2.3.1-33.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-block-curl-2.3.1-33.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-guest-agent-2.3.1-33.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-lang-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-lang-2.3.1-33.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-ppc-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-ppc-2.3.1-33.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.12.1.ppc64le",
"product": {
"name": "qemu-tools-2.3.1-33.12.1.ppc64le",
"product_id": "qemu-tools-2.3.1-33.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-2.3.1-33.12.1.s390x",
"product_id": "qemu-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-block-curl-2.3.1-33.12.1.s390x",
"product_id": "qemu-block-curl-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-guest-agent-2.3.1-33.12.1.s390x",
"product_id": "qemu-guest-agent-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-kvm-2.3.1-33.12.1.s390x",
"product_id": "qemu-kvm-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-lang-2.3.1-33.12.1.s390x",
"product_id": "qemu-lang-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-s390-2.3.1-33.12.1.s390x",
"product_id": "qemu-s390-2.3.1-33.12.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.12.1.s390x",
"product": {
"name": "qemu-tools-2.3.1-33.12.1.s390x",
"product_id": "qemu-tools-2.3.1-33.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-2.3.1-33.12.1.x86_64",
"product_id": "qemu-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-block-curl-2.3.1-33.12.1.x86_64",
"product_id": "qemu-block-curl-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.3.1-33.12.1.x86_64",
"product_id": "qemu-block-rbd-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.3.1-33.12.1.x86_64",
"product_id": "qemu-guest-agent-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-kvm-2.3.1-33.12.1.x86_64",
"product_id": "qemu-kvm-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-lang-2.3.1-33.12.1.x86_64",
"product_id": "qemu-lang-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-tools-2.3.1-33.12.1.x86_64",
"product_id": "qemu-tools-2.3.1-33.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.3.1-33.12.1.x86_64",
"product": {
"name": "qemu-x86-2.3.1-33.12.1.x86_64",
"product_id": "qemu-x86-2.3.1-33.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch"
},
"product_reference": "qemu-sgabios-8-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.12.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-kvm-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-lang-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-s390-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch"
},
"product_reference": "qemu-sgabios-8-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x"
},
"product_reference": "qemu-tools-2.3.1-33.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T18:20:27Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T18:20:27Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.12.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T18:20:27Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1935-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:46 - Updated: 2018-10-18 12:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe Intel CPU microcode bundle was updated to the 20180703 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)\nand helps mitigating CVE-2018-3639 (Spectre v4) (bsc#1100147 bsc#1087082 bsc#1087083).\n\nMore information on:\n https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File\n\nFollowing chipsets are fixed in this round:\n\nModel Stepping F-MO-S/PI Old-\u003eNew\n\n---- updated platforms ------------------------------------\n\nSNB-EP C1 6-2d-6/6d 0000061c-\u003e0000061d Xeon E5\nSNB-EP C2 6-2d-7/6d 00000713-\u003e00000714 Xeon E5\nIVT C0 6-3e-4/ed 0000042c-\u003e0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K\nIVT D1 6-3e-7/ed 00000713-\u003e00000714 Xeon E5 v2\nHSX-E/EP/4S C0 6-3f-2/6f 0000003c-\u003e0000003d Xeon E5 v3\nHSX-EX E0 6-3f-4/80 00000011-\u003e00000012 Xeon E7 v3\nSKX-SP/D/W/X H0 6-55-4/b7 02000043-\u003e0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX\nBDX-DE A1 6-56-5/10 0e000009-\u003e0e00000a Xeon D-15x3N\nBDX-ML B/M/R0 6-4f-1/ef 0b00002c-\u003e0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx\n\n- Add a new style supplements for the recent kernels. (bsc#1096141)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1935-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1935-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181935-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1935-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1096141",
"url": "https://bugzilla.suse.com/1096141"
},
{
"category": "self",
"summary": "SUSE Bug 1100147",
"url": "https://bugzilla.suse.com/1100147"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
}
],
"title": "Recommended update for ucode-intel",
"tracking": {
"current_release_date": "2018-10-18T12:46:53Z",
"generator": {
"date": "2018-10-18T12:46:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1935-2",
"initial_release_date": "2018-10-18T12:46:53Z",
"revision_history": [
{
"date": "2018-10-18T12:46:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180703-13.25.1.x86_64",
"product": {
"name": "ucode-intel-20180703-13.25.1.x86_64",
"product_id": "ucode-intel-20180703-13.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
}
]
}
SUSE-SU-2018:2650-1
Vulnerability from csaf_suse - Published: 2018-09-07 10:42 - Updated: 2018-09-07 10:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kvm fixes the following security issues:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS\n (bsc#1098735)\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kvm-13771",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2650-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2650-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182650-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2650-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-09-07T10:42:35Z",
"generator": {
"date": "2018-09-07T10:42:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2650-1",
"initial_release_date": "2018-09-07T10:42:35Z",
"revision_history": [
{
"date": "2018-09-07T10:42:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.15.2.i586",
"product": {
"name": "kvm-1.4.2-60.15.2.i586",
"product_id": "kvm-1.4.2-60.15.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.15.2.s390x",
"product": {
"name": "kvm-1.4.2-60.15.2.s390x",
"product_id": "kvm-1.4.2-60.15.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.15.2.x86_64",
"product": {
"name": "kvm-1.4.2-60.15.2.x86_64",
"product_id": "kvm-1.4.2-60.15.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586"
},
"product_reference": "kvm-1.4.2-60.15.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x"
},
"product_reference": "kvm-1.4.2-60.15.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64"
},
"product_reference": "kvm-1.4.2-60.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586"
},
"product_reference": "kvm-1.4.2-60.15.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x"
},
"product_reference": "kvm-1.4.2-60.15.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.15.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
},
"product_reference": "kvm-1.4.2-60.15.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-07T10:42:35Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-07T10:42:35Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.15.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.15.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-09-07T10:42:35Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2141-1
Vulnerability from csaf_suse - Published: 2018-07-30 16:11 - Updated: 2018-07-30 16:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-3639: Add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits to address V4 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092885).\n- CVE-2018-1064: Fix denial of service problem during reading from guest agent (bsc#1083625).\n- CVE-2018-5748: Fix resource exhaustion via qemuMonitorIORead() method (bsc#1076500).\n- CVE-2016-5008: Fix that an empty VNC password disables authentication (bsc#987527).\n- CVE-2017-5715: Fix speculative side channel attacks aka \u0027SpectreAttack\u0027 (var2) (bsc#1079869).\n\nBug fixes:\n\n- bsc#980558: Fix NUMA node memory allocation.\n- bsc#968483: Restart daemons in %posttrans after connection drivers.\n- bsc#897352: Systemd fails to ignore LSB services.\n- bsc#956298: virsh domxml-to-native causes segfault of libvirtd.\n- bsc#964465: libvirtd.service causes systemd warning about xencommons service.\n- bsc#954872: Script block-dmmd not working as expected.\n- bsc#854343: libvirt installation run inappropriate systemd restart.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1455",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2141-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2141-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182141-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2141-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html"
},
{
"category": "self",
"summary": "SUSE Bug 1076500",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "self",
"summary": "SUSE Bug 1079869",
"url": "https://bugzilla.suse.com/1079869"
},
{
"category": "self",
"summary": "SUSE Bug 1083625",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 854343",
"url": "https://bugzilla.suse.com/854343"
},
{
"category": "self",
"summary": "SUSE Bug 897352",
"url": "https://bugzilla.suse.com/897352"
},
{
"category": "self",
"summary": "SUSE Bug 954872",
"url": "https://bugzilla.suse.com/954872"
},
{
"category": "self",
"summary": "SUSE Bug 956298",
"url": "https://bugzilla.suse.com/956298"
},
{
"category": "self",
"summary": "SUSE Bug 964465",
"url": "https://bugzilla.suse.com/964465"
},
{
"category": "self",
"summary": "SUSE Bug 968483",
"url": "https://bugzilla.suse.com/968483"
},
{
"category": "self",
"summary": "SUSE Bug 980558",
"url": "https://bugzilla.suse.com/980558"
},
{
"category": "self",
"summary": "SUSE Bug 987527",
"url": "https://bugzilla.suse.com/987527"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1064 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5748 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5748/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-07-30T16:11:30Z",
"generator": {
"date": "2018-07-30T16:11:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2141-1",
"initial_release_date": "2018-07-30T16:11:30Z",
"revision_history": [
{
"date": "2018-07-30T16:11:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-client-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-doc-1.2.5-27.13.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-1.2.5-27.13.1.s390x",
"product_id": "libvirt-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.s390x",
"product_id": "libvirt-client-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.s390x",
"product_id": "libvirt-doc-1.2.5-27.13.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-client-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-client-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-doc-1.2.5-27.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-27.13.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5008"
}
],
"notes": [
{
"category": "general",
"text": "libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5008",
"url": "https://www.suse.com/security/cve/CVE-2016-5008"
},
{
"category": "external",
"summary": "SUSE Bug 987527 for CVE-2016-5008",
"url": "https://bugzilla.suse.com/987527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2016-5008"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-1064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1064"
}
],
"notes": [
{
"category": "general",
"text": "libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1064",
"url": "https://www.suse.com/security/cve/CVE-2018-1064"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2018-1064",
"url": "https://bugzilla.suse.com/1088147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2018-1064"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5748"
}
],
"notes": [
{
"category": "general",
"text": "qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5748",
"url": "https://www.suse.com/security/cve/CVE-2018-5748"
},
{
"category": "external",
"summary": "SUSE Bug 1076500 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1076500"
},
{
"category": "external",
"summary": "SUSE Bug 1083625 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1083625"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2018-5748",
"url": "https://bugzilla.suse.com/1087887"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-client-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-config-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-interface-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-libxl-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-network-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nodedev-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-nwfilter-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-secret-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-driver-storage-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-lxc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-qemu-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-daemon-xen-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-doc-1.2.5-27.13.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:libvirt-lock-sanlock-1.2.5-27.13.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-30T16:11:30Z",
"details": "low"
}
],
"title": "CVE-2018-5748"
}
]
}
SUSE-SU-2018:1368-1
Vulnerability from csaf_suse - Published: 2018-05-22 16:00 - Updated: 2018-05-22 16:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.\n- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions\n merged from the upstream kernel.\n\nThe following non-security bugs were fixed:\n\n- Avoid quadratic search when freeing delegations (bsc#1084760).\n- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).\n- hid: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).\n- powerpc/64: Disable gmb() on powerpc\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- series.conf: fix the header It was corrupted back in 2015.\n- tracing: Create seq_buf layer in trace_seq (bsc#1091815).\n- Update config files. Enable retpolines for i386 build.\n- usb: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).\n- usb: hub: fix SS hub-descriptor handling (bsc#1092372).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)\n- x86/xen: disable IBRS around CPU stopper function invocation\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n- xfs: fix buffer use after free on IO error (bsc#1052943).\n- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-20180512-13618,slessp4-kernel-20180512-13618,slexsp3-kernel-20180512-13618",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1368-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1368-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1368-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1052943",
"url": "https://bugzilla.suse.com/1052943"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1084760",
"url": "https://bugzilla.suse.com/1084760"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1090630",
"url": "https://bugzilla.suse.com/1090630"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1091671",
"url": "https://bugzilla.suse.com/1091671"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1091815",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "self",
"summary": "SUSE Bug 1092372",
"url": "https://bugzilla.suse.com/1092372"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T16:00:19Z",
"generator": {
"date": "2018-05-22T16:00:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1368-1",
"initial_release_date": "2018-05-22T16:00:19Z",
"revision_history": [
{
"date": "2018-05-22T16:00:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.48.1.i586",
"product_id": "kernel-default-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.i586",
"product_id": "kernel-default-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.48.1.i586",
"product_id": "kernel-source-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.i586",
"product_id": "kernel-syms-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.48.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.48.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.48.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-base-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.ia64",
"product_id": "kernel-source-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.ia64",
"product_id": "kernel-syms-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.48.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.48.1.noarch",
"product_id": "kernel-docs-3.0.101-108.48.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.ppc64",
"product_id": "kernel-source-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.48.1.s390x",
"product_id": "kernel-source-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.s390x",
"product_id": "kernel-syms-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.48.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.48.1.x86_64",
"product_id": "kernel-source-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.48.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-108.48.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
},
"product_reference": "kernel-docs-3.0.101-108.48.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.48.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.48.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T16:00:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2019:1211-2
Vulnerability from csaf_suse - Published: 2019-07-01 13:02 - Updated: 2019-07-01 13:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Better String parsing (bsc#1132728).\n- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).\n- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).\n- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE\n\nNon-Security issue fixed:\n\n- Disable LTO (bsc#1133135).\n- Added Japanese new era name.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1211,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1211,SUSE-SLE-Module-Legacy-15-SP1-2019-1211",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1211-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1211-2",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191211-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1211-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html"
},
{
"category": "self",
"summary": "SUSE Bug 1132728",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "self",
"summary": "SUSE Bug 1132729",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "self",
"summary": "SUSE Bug 1132732",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "self",
"summary": "SUSE Bug 1133135",
"url": "https://bugzilla.suse.com/1133135"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2684 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2698/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2019-07-01T13:02:11Z",
"generator": {
"date": "2019-07-01T13:02:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1211-2",
"initial_release_date": "2019-07-01T13:02:11Z",
"revision_history": [
{
"date": "2019-07-01T13:02:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-01T13:02:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2602",
"url": "https://www.suse.com/security/cve/CVE-2019-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1132728 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1134718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-01T13:02:11Z",
"details": "moderate"
}
],
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2684"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2684",
"url": "https://www.suse.com/security/cve/CVE-2019-2684"
},
{
"category": "external",
"summary": "SUSE Bug 1132732 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1184734 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1184734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-01T13:02:11Z",
"details": "moderate"
}
],
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2698"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2698",
"url": "https://www.suse.com/security/cve/CVE-2019-2698"
},
{
"category": "external",
"summary": "SUSE Bug 1132729 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-01T13:02:11Z",
"details": "important"
}
],
"title": "CVE-2019-2698"
}
]
}
SUSE-SU-2018:1378-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:10 - Updated: 2018-05-22 11:10Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\nThis non-security issue was fixed:\n\n- bsc#1070615: Add new look up path \u0027sys/class/tpm\u0027 for tpm cancel path\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-951,SUSE-SLE-SERVER-12-SP3-2018-951",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1378-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1378-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181378-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1378-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html"
},
{
"category": "self",
"summary": "SUSE Bug 1070615",
"url": "https://bugzilla.suse.com/1070615"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-22T11:10:36Z",
"generator": {
"date": "2018-05-22T11:10:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1378-1",
"initial_release_date": "2018-05-22T11:10:36Z",
"revision_history": [
{
"date": "2018-05-22T11:10:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-2.9.1-6.16.1.aarch64",
"product_id": "qemu-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-arm-2.9.1-6.16.1.aarch64",
"product_id": "qemu-arm-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-block-curl-2.9.1-6.16.1.aarch64",
"product_id": "qemu-block-curl-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"product_id": "qemu-block-iscsi-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.16.1.aarch64",
"product_id": "qemu-block-rbd-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.16.1.aarch64",
"product_id": "qemu-block-ssh-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.16.1.aarch64",
"product_id": "qemu-guest-agent-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-lang-2.9.1-6.16.1.aarch64",
"product_id": "qemu-lang-2.9.1-6.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.16.1.aarch64",
"product": {
"name": "qemu-tools-2.9.1-6.16.1.aarch64",
"product_id": "qemu-tools-2.9.1-6.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-6.16.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-6.16.1.noarch",
"product_id": "qemu-ipxe-1.0.0-6.16.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.10.2-6.16.1.noarch",
"product": {
"name": "qemu-seabios-1.10.2-6.16.1.noarch",
"product_id": "qemu-seabios-1.10.2-6.16.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-6.16.1.noarch",
"product": {
"name": "qemu-sgabios-8-6.16.1.noarch",
"product_id": "qemu-sgabios-8-6.16.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.10.2-6.16.1.noarch",
"product": {
"name": "qemu-vgabios-1.10.2-6.16.1.noarch",
"product_id": "qemu-vgabios-1.10.2-6.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-block-curl-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-block-ssh-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-guest-agent-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-lang-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-lang-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-ppc-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-ppc-2.9.1-6.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.16.1.ppc64le",
"product": {
"name": "qemu-tools-2.9.1-6.16.1.ppc64le",
"product_id": "qemu-tools-2.9.1-6.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-2.9.1-6.16.1.s390x",
"product_id": "qemu-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-block-curl-2.9.1-6.16.1.s390x",
"product_id": "qemu-block-curl-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.s390x",
"product_id": "qemu-block-iscsi-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-block-ssh-2.9.1-6.16.1.s390x",
"product_id": "qemu-block-ssh-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-guest-agent-2.9.1-6.16.1.s390x",
"product_id": "qemu-guest-agent-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-kvm-2.9.1-6.16.1.s390x",
"product_id": "qemu-kvm-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-lang-2.9.1-6.16.1.s390x",
"product_id": "qemu-lang-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-s390-2.9.1-6.16.1.s390x",
"product_id": "qemu-s390-2.9.1-6.16.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.16.1.s390x",
"product": {
"name": "qemu-tools-2.9.1-6.16.1.s390x",
"product_id": "qemu-tools-2.9.1-6.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-2.9.1-6.16.1.x86_64",
"product_id": "qemu-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-block-curl-2.9.1-6.16.1.x86_64",
"product_id": "qemu-block-curl-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-kvm-2.9.1-6.16.1.x86_64",
"product_id": "qemu-kvm-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-tools-2.9.1-6.16.1.x86_64",
"product_id": "qemu-tools-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-x86-2.9.1-6.16.1.x86_64",
"product_id": "qemu-x86-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"product_id": "qemu-block-iscsi-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.16.1.x86_64",
"product_id": "qemu-block-rbd-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.16.1.x86_64",
"product_id": "qemu-block-ssh-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.16.1.x86_64",
"product_id": "qemu-guest-agent-2.9.1-6.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.16.1.x86_64",
"product": {
"name": "qemu-lang-2.9.1-6.16.1.x86_64",
"product_id": "qemu-lang-2.9.1-6.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.16.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.16.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.16.1.noarch"
},
"product_reference": "qemu-sgabios-8-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.16.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.16.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.16.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:10:36Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1603-1
Vulnerability from csaf_suse - Published: 2018-06-08 10:36 - Updated: 2018-06-08 10:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nbsc#1027519\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-xen-13647,slessp4-xen-13647",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1603-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1603-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181603-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1603-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-08T10:36:09Z",
"generator": {
"date": "2018-06-08T10:36:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1603-1",
"initial_release_date": "2018-06-08T10:36:09Z",
"revision_history": [
{
"date": "2018-06-08T10:36:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-devel-4.4.4_32-61.29.2.i586",
"product_id": "xen-devel-4.4.4_32-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product_id": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"product_id": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-libs-4.4.4_32-61.29.2.i586",
"product_id": "xen-libs-4.4.4_32-61.29.2.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"product": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"product_id": "xen-tools-domU-4.4.4_32-61.29.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-devel-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-devel-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-doc-html-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"product_id": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-libs-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-tools-4.4.4_32-61.29.2.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"product_id": "xen-tools-domU-4.4.4_32-61.29.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-devel-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-devel-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-61.29.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-doc-html-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-default-4.4.4_32_3.0.101_108.52-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-kmp-pae-4.4.4_32_3.0.101_108.52-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-32bit-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-libs-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:xen-tools-domU-4.4.4_32-61.29.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:xen-devel-4.4.4_32-61.29.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T10:36:09Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2340-1
Vulnerability from csaf_suse - Published: 2018-08-15 13:45 - Updated: 2018-08-15 13:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu to version 2.11.2 fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-11806: Fix heap buffer overflow issue that can happen while reassembling fragmented datagrams (bsc#1096223).\n- CVE-2018-3639: Mitigation functionality for Speculative Store Bypass issue in x86 (bsc#1087082).\n- CVE-2018-7550: Fix out of bounds read and write memory access, potentially leading to code execution (bsc#1083291)\n\nBug fixes:\n\n- bsc#1091695: SEV guest will not lauchh with qemu-system-x86_64 version 2.11.1.\n- bsc#1094898: qemu-guest-agent service doesn\u0027t work in version Leap 15.0.\n- bsc#1094725: `virsh blockresize` does not work with Xen qdisks.\n- bsc#1094913: QEMU crashes when starting a guest with more than 7.999TB.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1577,SUSE-SLE-Module-Server-Applications-15-2018-1577",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2340-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2340-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182340-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2340-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html"
},
{
"category": "self",
"summary": "SUSE Bug 1083291",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1091695",
"url": "https://bugzilla.suse.com/1091695"
},
{
"category": "self",
"summary": "SUSE Bug 1094725",
"url": "https://bugzilla.suse.com/1094725"
},
{
"category": "self",
"summary": "SUSE Bug 1094898",
"url": "https://bugzilla.suse.com/1094898"
},
{
"category": "self",
"summary": "SUSE Bug 1094913",
"url": "https://bugzilla.suse.com/1094913"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7550 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7550/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-08-15T13:45:55Z",
"generator": {
"date": "2018-08-15T13:45:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2340-1",
"initial_release_date": "2018-08-15T13:45:55Z",
"revision_history": [
{
"date": "2018-08-15T13:45:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-tools-2.11.2-9.4.1.aarch64",
"product_id": "qemu-tools-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-2.11.2-9.4.1.aarch64",
"product_id": "qemu-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-arm-2.11.2-9.4.1.aarch64",
"product_id": "qemu-arm-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-block-curl-2.11.2-9.4.1.aarch64",
"product_id": "qemu-block-curl-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"product_id": "qemu-block-iscsi-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.11.2-9.4.1.aarch64",
"product_id": "qemu-block-rbd-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.11.2-9.4.1.aarch64",
"product_id": "qemu-block-ssh-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.11.2-9.4.1.aarch64",
"product_id": "qemu-guest-agent-2.11.2-9.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.4.1.aarch64",
"product": {
"name": "qemu-lang-2.11.2-9.4.1.aarch64",
"product_id": "qemu-lang-2.11.2-9.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-9.4.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-9.4.1.noarch",
"product_id": "qemu-ipxe-1.0.0-9.4.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.11.0-9.4.1.noarch",
"product": {
"name": "qemu-seabios-1.11.0-9.4.1.noarch",
"product_id": "qemu-seabios-1.11.0-9.4.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-9.4.1.noarch",
"product": {
"name": "qemu-sgabios-8-9.4.1.noarch",
"product_id": "qemu-sgabios-8-9.4.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.11.0-9.4.1.noarch",
"product": {
"name": "qemu-vgabios-1.11.0-9.4.1.noarch",
"product_id": "qemu-vgabios-1.11.0-9.4.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-tools-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-tools-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-block-curl-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-block-iscsi-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-block-rbd-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-block-ssh-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-guest-agent-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-lang-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-lang-2.11.2-9.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.4.1.ppc64le",
"product": {
"name": "qemu-ppc-2.11.2-9.4.1.ppc64le",
"product_id": "qemu-ppc-2.11.2-9.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-tools-2.11.2-9.4.1.s390x",
"product_id": "qemu-tools-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-2.11.2-9.4.1.s390x",
"product_id": "qemu-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-block-curl-2.11.2-9.4.1.s390x",
"product_id": "qemu-block-curl-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.s390x",
"product_id": "qemu-block-iscsi-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-block-rbd-2.11.2-9.4.1.s390x",
"product_id": "qemu-block-rbd-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-block-ssh-2.11.2-9.4.1.s390x",
"product_id": "qemu-block-ssh-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-guest-agent-2.11.2-9.4.1.s390x",
"product_id": "qemu-guest-agent-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-kvm-2.11.2-9.4.1.s390x",
"product_id": "qemu-kvm-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-lang-2.11.2-9.4.1.s390x",
"product_id": "qemu-lang-2.11.2-9.4.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.4.1.s390x",
"product": {
"name": "qemu-s390-2.11.2-9.4.1.s390x",
"product_id": "qemu-s390-2.11.2-9.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-tools-2.11.2-9.4.1.x86_64",
"product_id": "qemu-tools-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-2.11.2-9.4.1.x86_64",
"product_id": "qemu-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-block-curl-2.11.2-9.4.1.x86_64",
"product_id": "qemu-block-curl-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"product_id": "qemu-block-iscsi-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.11.2-9.4.1.x86_64",
"product_id": "qemu-block-rbd-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.11.2-9.4.1.x86_64",
"product_id": "qemu-block-ssh-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.11.2-9.4.1.x86_64",
"product_id": "qemu-guest-agent-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-kvm-2.11.2-9.4.1.x86_64",
"product_id": "qemu-kvm-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-lang-2.11.2-9.4.1.x86_64",
"product_id": "qemu-lang-2.11.2-9.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.4.1.x86_64",
"product": {
"name": "qemu-x86-2.11.2-9.4.1.x86_64",
"product_id": "qemu-x86-2.11.2-9.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-tools-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-tools-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-tools-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-tools-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-arm-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-block-curl-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-block-curl-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-block-rbd-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-block-ssh-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-guest-agent-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-9.4.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-9.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-kvm-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.4.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64"
},
"product_reference": "qemu-lang-2.11.2-9.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-lang-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-lang-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-lang-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-9.4.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le"
},
"product_reference": "qemu-ppc-2.11.2-9.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-9.4.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x"
},
"product_reference": "qemu-s390-2.11.2-9.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-9.4.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch"
},
"product_reference": "qemu-seabios-1.11.0-9.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-9.4.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch"
},
"product_reference": "qemu-sgabios-8-9.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-9.4.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-9.4.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-9.4.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
},
"product_reference": "qemu-x86-2.11.2-9.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T13:45:55Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T13:45:55Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-7550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7550"
}
],
"notes": [
{
"category": "general",
"text": "The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7550",
"url": "https://www.suse.com/security/cve/CVE-2018-7550"
},
{
"category": "external",
"summary": "SUSE Bug 1083291 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083291"
},
{
"category": "external",
"summary": "SUSE Bug 1083292 for CVE-2018-7550",
"url": "https://bugzilla.suse.com/1083292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.4.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.4.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.4.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.4.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T13:45:55Z",
"details": "important"
}
],
"title": "CVE-2018-7550"
}
]
}
SUSE-SU-2018:2528-1
Vulnerability from csaf_suse - Published: 2018-08-27 10:02 - Updated: 2018-08-27 10:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes the following issues:\n\nThese security issue were fixed:\n\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution\n and address translations may have allowed unauthorized disclosure of\n information residing in the L1 data cache to an attacker with local user access\n with guest OS privilege via a terminal page fault and a side-channel analysis\n (bsc#1091107, bsc#1027519).\n- CVE-2018-12617: An integer overflow that could cause a segmentation\n fault in qmp_guest_file_read() with g_malloc() in qemu-guest-agent was\n fixed (bsc#1098744)\n- CVE-2018-3665: System software utilizing Lazy FP state restore technique\n on systems using Intel Core-based microprocessors may potentially allow\n a local process to infer data from another process through a speculative\n execution side channel. (bsc#1095242)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative\n execution and speculative execution of memory reads before the addresses\n of all prior memory writes are known may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis, aka Speculative Store Bypass (SSB), Variant 4. (bsc#1092631)\n- CVE-2017-5715: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative\n execution and branch prediction may allow unauthorized disclosure of\n information to an attacker with local user access via a side-channel\n analysis. (bsc#1074562)\n- CVE-2017-5754: Systems with microprocessors utilizing speculative\n execution and indirect branch prediction may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis of the data cache. (bsc#1074562)\n- CVE-2018-12891: Certain PV MMU operations may take a long time to\n process. For that reason Xen explicitly checks for the need to preempt\n the current vCPU at certain points. A few rarely taken code paths did\n bypass such checks. By suitably enforcing the conditions through its own\n page table contents, a malicious guest may cause such bypasses to be used\n for an unbounded number of iterations. A malicious or buggy PV guest may\n cause a Denial of Service (DoS) affecting the entire host. Specifically,\n it may prevent use of a physical CPU for an indeterminate period of\n time. (bsc#1097521)\n- CVE-2018-12893: One of the fixes in XSA-260 added some safety checks\n to help prevent Xen livelocking with debug exceptions. Unfortunately,\n due to an oversight, at least one of these safety checks can be\n triggered by a guest. A malicious PV guest can crash Xen, leading to\n a Denial of Service. Only x86 PV guests can exploit the vulnerability. x86\n HVM and PVH guests cannot exploit the vulnerability. An attacker\n needs to be able to control hardware debugging facilities to exploit\n the vulnerability, but such permissions are typically available to\n unprivileged users. (bsc#1097522)\n- CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer\n overflow via incoming fragmented datagrams. (bsc#1096224)\n- CVE-2018-10982: An issue was discovered in Xen allowed x86 HVM guest\n OS users to cause a denial of service (unexpectedly high interrupt\n number, array overrun, and hypervisor crash) or possibly gain hypervisor\n privileges by setting up an HPET timer to deliver interrupts in IO-APIC\n mode, aka vHPET interrupt injection. (bsc#1090822)\n- CVE-2018-10981: An issue was discovered in Xen that allowed x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. (bsc#1090823)\n\nFollowing bugs were fixed:\n\n- After updating to kernel 3.0.101-0.47.106.32-xen system crashes in check_bugs() (bsc#1097206)\n- bsc#1079730 - in xen-kmp, unplug emulated devices after migration\n This is required since xen-4.10 and/or qemu-2.10 because the state\n of unplug is not propagated from one dom0 to another. Without\n this unplug qemu\u0027s block-backend will be unable to open qcow2\n disks on the receiving dom0\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-xen-13752,slessp3-xen-13752",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2528-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2528-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182528-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2528-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1079730",
"url": "https://bugzilla.suse.com/1079730"
},
{
"category": "self",
"summary": "SUSE Bug 1090822",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "self",
"summary": "SUSE Bug 1090823",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "self",
"summary": "SUSE Bug 1091107",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE Bug 1095242",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "self",
"summary": "SUSE Bug 1096224",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "self",
"summary": "SUSE Bug 1097206",
"url": "https://bugzilla.suse.com/1097206"
},
{
"category": "self",
"summary": "SUSE Bug 1097521",
"url": "https://bugzilla.suse.com/1097521"
},
{
"category": "self",
"summary": "SUSE Bug 1097522",
"url": "https://bugzilla.suse.com/1097522"
},
{
"category": "self",
"summary": "SUSE Bug 1098744",
"url": "https://bugzilla.suse.com/1098744"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10981 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10982 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12891 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12893 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12893/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3665 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3665/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-08-27T10:02:13Z",
"generator": {
"date": "2018-08-27T10:02:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2528-1",
"initial_release_date": "2018-08-27T10:02:13Z",
"revision_history": [
{
"date": "2018-08-27T10:02:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.25.1.i586",
"product": {
"name": "xen-libs-4.2.5_21-45.25.1.i586",
"product_id": "xen-libs-4.2.5_21-45.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"product_id": "xen-tools-domU-4.2.5_21-45.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-doc-html-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"product": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-libs-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-libs-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-tools-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-tools-4.2.5_21-45.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"product": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"product_id": "xen-tools-domU-4.2.5_21-45.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-doc-html-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64"
},
"product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586"
},
"product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-libs-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-tools-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.2.5_21-45.25.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
},
"product_reference": "xen-tools-domU-4.2.5_21-45.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-10981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10981"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10981",
"url": "https://www.suse.com/security/cve/CVE-2018-10981"
},
{
"category": "external",
"summary": "SUSE Bug 1090823 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-10981"
},
{
"cve": "CVE-2018-10982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10982"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10982",
"url": "https://www.suse.com/security/cve/CVE-2018-10982"
},
{
"category": "external",
"summary": "SUSE Bug 1090822 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-10982"
},
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-12891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12891"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12891",
"url": "https://www.suse.com/security/cve/CVE-2018-12891"
},
{
"category": "external",
"summary": "SUSE Bug 1097521 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1097521"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12891",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-12891"
},
{
"cve": "CVE-2018-12893",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12893"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12893",
"url": "https://www.suse.com/security/cve/CVE-2018-12893"
},
{
"category": "external",
"summary": "SUSE Bug 1097522 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1097522"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12893",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-12893"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
},
{
"cve": "CVE-2018-3665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3665"
}
],
"notes": [
{
"category": "general",
"text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3665",
"url": "https://www.suse.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087086 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "external",
"summary": "SUSE Bug 1090338 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1090338"
},
{
"category": "external",
"summary": "SUSE Bug 1095241 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095241"
},
{
"category": "external",
"summary": "SUSE Bug 1095242 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "external",
"summary": "SUSE Bug 1096740 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1096740"
},
{
"category": "external",
"summary": "SUSE Bug 1100091 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100091"
},
{
"category": "external",
"summary": "SUSE Bug 1100555 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100555"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-html-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-doc-pdf-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.43-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.43-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-32bit-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-libs-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-4.2.5_21-45.25.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:xen-tools-domU-4.2.5_21-45.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-27T10:02:13Z",
"details": "moderate"
}
],
"title": "CVE-2018-3665"
}
]
}
SUSE-SU-2018:1614-1
Vulnerability from csaf_suse - Published: 2018-06-08 15:53 - Updated: 2018-06-08 15:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\n- CVE-2018-3639: cpu: add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits pass through (bsc#1092885)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1100,SUSE-SLE-SAP-12-SP2-2018-1100,SUSE-SLE-SERVER-12-SP2-2018-1100,SUSE-Storage-4-2018-1100",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1614-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1614-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181614-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1614-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-06-08T15:53:31Z",
"generator": {
"date": "2018-06-08T15:53:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1614-1",
"initial_release_date": "2018-06-08T15:53:31Z",
"revision_history": [
{
"date": "2018-06-08T15:53:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-client-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-client-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-doc-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-doc-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.42.1.ppc64le",
"product": {
"name": "libvirt-nss-2.0.0-27.42.1.ppc64le",
"product_id": "libvirt-nss-2.0.0-27.42.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-2.0.0-27.42.1.s390x",
"product_id": "libvirt-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-client-2.0.0-27.42.1.s390x",
"product_id": "libvirt-client-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"product_id": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-doc-2.0.0-27.42.1.s390x",
"product_id": "libvirt-doc-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"product_id": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.42.1.s390x",
"product": {
"name": "libvirt-nss-2.0.0-27.42.1.s390x",
"product_id": "libvirt-nss-2.0.0-27.42.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-client-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-doc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-nss-2.0.0-27.42.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.ppc64le"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.s390x"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Enterprise Storage 4:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libvirt-nss-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.s390x",
"SUSE OpenStack Cloud 7:libvirt-nss-2.0.0-27.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-08T15:53:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1377-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:45 - Updated: 2018-10-18 12:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bug was fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\nThe following related and non-security bugs were fixed:\n\n- cpuid: Fix cpuid.edx.7.0 propagation to guest\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-956",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1377-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1377-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1377-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1092289",
"url": "https://bugzilla.suse.com/1092289"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-10-18T12:45:05Z",
"generator": {
"date": "2018-10-18T12:45:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1377-2",
"initial_release_date": "2018-10-18T12:45:05Z",
"revision_history": [
{
"date": "2018-10-18T12:45:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.80.1.noarch",
"product_id": "kernel-devel-4.4.121-92.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.80.1.noarch",
"product_id": "kernel-macros-4.4.121-92.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.80.1.noarch",
"product_id": "kernel-source-4.4.121-92.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"product_id": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:45:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1935-1
Vulnerability from csaf_suse - Published: 2018-07-12 06:50 - Updated: 2018-07-12 06:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe Intel CPU microcode bundle was updated to the 20180703 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a)\nand helps mitigating CVE-2018-3639 (Spectre v4) (bsc#1100147 bsc#1087082 bsc#1087083).\n\nMore information on:\n https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File\n\nFollowing chipsets are fixed in this round:\n\nModel Stepping F-MO-S/PI Old-\u003eNew\n\n---- updated platforms ------------------------------------\n\nSNB-EP C1 6-2d-6/6d 0000061c-\u003e0000061d Xeon E5\nSNB-EP C2 6-2d-7/6d 00000713-\u003e00000714 Xeon E5\nIVT C0 6-3e-4/ed 0000042c-\u003e0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K\nIVT D1 6-3e-7/ed 00000713-\u003e00000714 Xeon E5 v2\nHSX-E/EP/4S C0 6-3f-2/6f 0000003c-\u003e0000003d Xeon E5 v3\nHSX-EX E0 6-3f-4/80 00000011-\u003e00000012 Xeon E7 v3\nSKX-SP/D/W/X H0 6-55-4/b7 02000043-\u003e0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX\nBDX-DE A1 6-56-5/10 0e000009-\u003e0e00000a Xeon D-15x3N\nBDX-ML B/M/R0 6-4f-1/ef 0b00002c-\u003e0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx\n\n- Add a new style supplements for the recent kernels. (bsc#1096141)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1308,SUSE-SLE-DESKTOP-12-SP3-2018-1308,SUSE-SLE-SAP-12-SP1-2018-1308,SUSE-SLE-SAP-12-SP2-2018-1308,SUSE-SLE-SERVER-12-2018-1308,SUSE-SLE-SERVER-12-SP1-2018-1308,SUSE-SLE-SERVER-12-SP2-2018-1308,SUSE-SLE-SERVER-12-SP3-2018-1308,SUSE-Storage-4-2018-1308",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1935-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1935-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181935-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1935-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1096141",
"url": "https://bugzilla.suse.com/1096141"
},
{
"category": "self",
"summary": "SUSE Bug 1100147",
"url": "https://bugzilla.suse.com/1100147"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
}
],
"title": "Recommended update for ucode-intel",
"tracking": {
"current_release_date": "2018-07-12T06:50:05Z",
"generator": {
"date": "2018-07-12T06:50:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1935-1",
"initial_release_date": "2018-07-12T06:50:05Z",
"revision_history": [
{
"date": "2018-07-12T06:50:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180703-13.25.1.x86_64",
"product": {
"name": "ucode-intel-20180703-13.25.1.x86_64",
"product_id": "ucode-intel-20180703-13.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180703-13.25.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64"
},
"product_reference": "ucode-intel-20180703-13.25.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-12T06:50:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180703-13.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180703-13.25.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180703-13.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-12T06:50:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
}
]
}
SUSE-SU-2018:1375-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:30 - Updated: 2018-05-22 11:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n\nThe following non-security bugs were fixed:\n\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/cpu/intel: Introduce macros for Intel family numbers (bsc#985025).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2018-954,SUSE-SLE-SAP-12-SP1-2018-954,SUSE-SLE-SERVER-12-SP1-2018-954",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1375-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1375-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1375-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087845",
"url": "https://bugzilla.suse.com/1087845"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE Bug 985025",
"url": "https://bugzilla.suse.com/985025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T11:30:24Z",
"generator": {
"date": "2018-05-22T11:30:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1375-1",
"initial_release_date": "2018-05-22T11:30:24Z",
"revision_history": [
{
"date": "2018-05-22T11:30:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.93.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.93.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.93.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.93.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.93.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.93.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.93.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.93.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.93.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.93.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.93.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.93.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.93.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.93.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.93.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.93.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.93.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.93.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.93.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.93.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.93.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.93.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.93.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.93.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.93.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.93.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.93.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.93.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.93.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.93.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.93.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.93.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.93.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.93.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.93.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.93.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.93.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.93.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.93.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.93.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:30:24Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:30:24Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.93.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.93.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-default-1-2.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_93-xen-1-2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:30:24Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1475-1
Vulnerability from csaf_suse - Published: 2018-05-30 11:19 - Updated: 2018-05-30 11:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\n- CVE-2018-3639: cpu: Added support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits pass through.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-libvirt-13632,slessp4-libvirt-13632",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1475-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1475-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181475-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1475-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-05-30T11:19:51Z",
"generator": {
"date": "2018-05-30T11:19:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1475-1",
"initial_release_date": "2018-05-30T11:19:51Z",
"revision_history": [
{
"date": "2018-05-30T11:19:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.15.1.i586",
"product": {
"name": "libvirt-devel-1.2.5-23.15.1.i586",
"product_id": "libvirt-devel-1.2.5-23.15.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.15.1.i586",
"product": {
"name": "libvirt-1.2.5-23.15.1.i586",
"product_id": "libvirt-1.2.5-23.15.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.15.1.i586",
"product": {
"name": "libvirt-client-1.2.5-23.15.1.i586",
"product_id": "libvirt-client-1.2.5-23.15.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.15.1.i586",
"product": {
"name": "libvirt-doc-1.2.5-23.15.1.i586",
"product_id": "libvirt-doc-1.2.5-23.15.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"product_id": "libvirt-lock-sanlock-1.2.5-23.15.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.15.1.ia64",
"product": {
"name": "libvirt-devel-1.2.5-23.15.1.ia64",
"product_id": "libvirt-devel-1.2.5-23.15.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.15.1.ia64",
"product": {
"name": "libvirt-1.2.5-23.15.1.ia64",
"product_id": "libvirt-1.2.5-23.15.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.15.1.ia64",
"product": {
"name": "libvirt-client-1.2.5-23.15.1.ia64",
"product_id": "libvirt-client-1.2.5-23.15.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.15.1.ia64",
"product": {
"name": "libvirt-doc-1.2.5-23.15.1.ia64",
"product_id": "libvirt-doc-1.2.5-23.15.1.ia64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-devel-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-devel-1.2.5-23.15.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-1.2.5-23.15.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-client-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-client-1.2.5-23.15.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-client-32bit-1.2.5-23.15.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-doc-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-doc-1.2.5-23.15.1.ppc64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-devel-1.2.5-23.15.1.s390x",
"product_id": "libvirt-devel-1.2.5-23.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-1.2.5-23.15.1.s390x",
"product_id": "libvirt-1.2.5-23.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-client-1.2.5-23.15.1.s390x",
"product_id": "libvirt-client-1.2.5-23.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.s390x",
"product_id": "libvirt-client-32bit-1.2.5-23.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-doc-1.2.5-23.15.1.s390x",
"product_id": "libvirt-doc-1.2.5-23.15.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"product_id": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-devel-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-devel-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-32bit-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-devel-32bit-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-devel-32bit-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-client-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-client-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-client-32bit-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-doc-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-doc-1.2.5-23.15.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-devel-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-devel-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-devel-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-devel-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-devel-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-32bit-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-devel-32bit-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-client-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-doc-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.15.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.15.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-client-32bit-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-doc-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:libvirt-lock-sanlock-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-1.2.5-23.15.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:libvirt-devel-32bit-1.2.5-23.15.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-30T11:19:51Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2019:1211-1
Vulnerability from csaf_suse - Published: 2019-05-10 12:09 - Updated: 2019-05-10 12:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Better String parsing (bsc#1132728).\n- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).\n- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).\n- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE\n\nNon-Security issue fixed:\n\n- Disable LTO (bsc#1133135).\n- Added Japanese new era name.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1211,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1211,SUSE-SLE-Module-Legacy-15-2019-1211,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-1211",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1211-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1211-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191211-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1211-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html"
},
{
"category": "self",
"summary": "SUSE Bug 1132728",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "self",
"summary": "SUSE Bug 1132729",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "self",
"summary": "SUSE Bug 1132732",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "self",
"summary": "SUSE Bug 1133135",
"url": "https://bugzilla.suse.com/1133135"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2684 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2698/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2019-05-10T12:09:23Z",
"generator": {
"date": "2019-05-10T12:09:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1211-1",
"initial_release_date": "2019-05-10T12:09:23Z",
"revision_history": [
{
"date": "2019-05-10T12:09:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-3.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
},
"product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-10T12:09:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2602",
"url": "https://www.suse.com/security/cve/CVE-2019-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1132728 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1134718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-10T12:09:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2684"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2684",
"url": "https://www.suse.com/security/cve/CVE-2019-2684"
},
{
"category": "external",
"summary": "SUSE Bug 1132732 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1184734 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1184734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-10T12:09:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2698"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2698",
"url": "https://www.suse.com/security/cve/CVE-2019-2698"
},
{
"category": "external",
"summary": "SUSE Bug 1132729 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.212-3.19.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.212-3.19.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-10T12:09:23Z",
"details": "important"
}
],
"title": "CVE-2019-2698"
}
]
}
SUSE-SU-2020:2540-1
Vulnerability from csaf_suse - Published: 2020-09-04 15:36 - Updated: 2020-09-04 15:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe following non-security bugs were fixed:\n\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547). \n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547). \n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547). \n- arm64: Always enable ssb vulnerability detection (bsc#1174547). \n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547). Update config/arm64/default \n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547). Update config/arm64/default\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547). \n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526). \n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547). \n- arm64: ssbd: explicitly depend on \u003clinux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64/sve: \u003cuapi/asm/ptrace.h\u003e should not depend on \u003cuapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021). \n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: intel: Fix memleak in sst_media_open (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- bcache: allocate meta data pages as compound pages (bsc#1172873).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: check queue\u0027s limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- constrants: fix malformed XML Closing tag of an element is \u0027\u003c/foo\u003e\u0027, not \u0027\u003cfoo/\u003e\u0027. Fixes: 8b37de2eb835 (\u0027rpm/constraints.in: Increase memory for kernel-docs\u0027)\n- Created new preempt kernel flavor (jsc#SLE-11309) Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-\u003ey are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: balloon: Remove dependencies on guest page size (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- Drivers: hv: vmbus: Remove the undesired put_cpu_ptr() in hv_synic_cleanup() (git-fixes).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956) \t* refresh for context changes\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956) \t* refreshed for context changes\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956) \t* move drm_mipi_dbi.c -\u003e tinydrm/mipi-drm.c \t* refresh for context changes\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178) \t* updated names of get/put functions\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm/adreno: fix updating ring fence (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178) \t* move files drivers/video/fbdev/core -\u003e drivers/video/console \t* refresh for context changes\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: check dereferencing null pointer (git-fixes).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: fix dereference null return value (git-fixes).\n- fsl/fman: fix eth hash table allocation (git-fixes).\n- fsl/fman: fix unreachable code (git-fixes).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fsl/fman: use 32-bit unsigned integer (git-fixes).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_balloon: Balloon up according to request page number (git-fixes).\n- hv_balloon: Use a static page for the balloon_up send buffer (git-fixes).\n- hv_netvsc: Allow scatter-gather feature to be tunable (git-fixes).\n- hv_netvsc: do not use VF device if link is down (git-fixes).\n- hv_netvsc: Fix a warning of suspicious RCU usage (git-fixes).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix extra rcu_read_unlock in netvsc_recv_callback() (git-fixes).\n- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- hv_netvsc: flag software created hash value (git-fixes).\n- hv_netvsc: Remove \u0027unlikely\u0027 from netvsc_select_queue (git-fixes).\n- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: psmouse - add a newline when printing \u0027proto\u0027 by sysfs (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip6_tunnel: allow not to count pkts on tstats by passing dev as NULL (bsc#1175515).\n- ip_tunnel: allow not to count pkts on tstats by setting skb\u0027s dev to NULL (bsc#1175515).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kabi: genetlink: remove genl_bind (kabi).\n- kabi: hide new parameter of ip6_dst_lookup_flow() (bsc#1165629).\n- kabi: mask changes to struct ipv6_stub (bsc#1165629).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernel-docs: Change Requires on python-Sphinx to earlier than version 3 References: bsc#1166965 From 3 on the internal API that the build system uses was rewritten in an incompatible way. See https://github.com/sphinx-doc/sphinx/issues/7421 and https://bugzilla.suse.com/show_bug.cgi?id=1166965#c16 for some details.\n- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: budget-core: Improve exception handling in budget_register() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- media: vpss: clean up resources in init (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: aquantia: Fix wrong return value (git-fixes).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).\n- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: spider_net: Fix the size used in a \u0027dma_free_coherent()\u0027 call (git-fixes).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: stmmac: Fix RX packet size \u003e 8191 (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- netvsc: unshare skb in VF rx handler (git-fixes).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- ntb: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- ntb: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- Revert \u0027ALSA: hda: call runtime_allow() for all hda controllers\u0027 (bsc#1111666).\n- Revert \u0027drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\u0027 (bsc#1113956) \t* refresh for context changes\n- Revert \u0027ocfs2: avoid inode removal while nfsd is accessing it\u0027 This reverts commit 9e096c72476eda333a9998ff464580c00ff59c83.\n- Revert \u0027ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\u0027 This reverts commit 0bf6e248f93736b3f17f399b4a8f64ffa30d371e.\n- Revert \u0027ocfs2: load global_inode_alloc (bsc#1172963).\u0027 This reverts commit fc476497b53f967dc615b9cbad9427ba3107b5c4.\n- Revert pciehp patches that broke booting (bsc#1174887) \n- Revert \u0027scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027scsi: qla2xxx: Fix crash on qla2x00_mailbox_command\u0027 (bsc#1171688 bsc#1174003).\n- Revert \u0027sign also s390x kernel images (bsc#1163524)\u0027 This reverts commit b38b61155f0a2c3ebca06d4bb0c2e11a19a87f1f.\n- Revert \u0027xen/balloon: Fix crash when ballooning on x86 32 bit PAE\u0027 (bsc#1065600).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rpm/check-for-config-changes: Ignore CONFIG_CC_VERSION_TEXT\n- rpm/check-for-config-changes: Ignore CONFIG_LD_VERSION\n- rpm/constraints.in: Increase memory for kernel-docs References: https://build.opensuse.org/request/show/792664\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/kabi.pl: account for namespace field being moved last Upstream is moving the namespace field in Module.symvers last in order to preserve backwards compatibility with kmod tools (depmod, etc). Fix the kabi.pl script to expect the namespace field last. Since split() ignores trailing empty fields and delimeters, switch to using tr to count how many fields/tabs are in a line. Also, in load_symvers(), pass LIMIT of -1 to split() so it does not strip trailing empty fields, as namespace is an optional field.\n- rpm/kernel-binary.spec.in: do not run klp-symbols for configs with no modules Starting with 5.8-rc1, s390x/zfcpdump builds fail because rpm/klp-symbols script does not find .tmp_versions directory. This is missing because s390x/zfcpdump is built without modules (CONFIG_MODULES disabled). As livepatching cannot work without modules, the cleanest solution is setting %klp_symbols to 0 if CONFIG_MODULES is disabled. (We cannot simply add another condition to the place where %klp_symbols is set as it can be already set to 1 from prjconf.)\n- rpm/kernel-binary.spec.in: restrict livepatch metapackage to default flavor It has been reported that the kernel-*-livepatch metapackage got erroneously enabled for SLE15-SP3\u0027s new -preempt flavor, leading to a unresolvable dependency to a non-existing kernel-livepatch-x.y.z-preempt package. As SLE12 and SLE12-SP1 have run out of livepatching support, the need to build said metapackage for the -xen flavor is gone and the only remaining flavor for which they\u0027re still wanted is -default. Restrict the build of the kernel-*-livepatch metapackage to the -default flavor.\n- rpm/kernel-obs-build.spec.in: add dm-crypt for building with cryptsetup Co-Authored-By: Adam Spiers \u003caspiers@suse.com\u003e\n- rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/mkspec-dtb: add mt76 based dtb package\n- rpm/package-descriptions: garbege collection remove old ARM and Xen flavors.\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003). \n- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix issue with adapter\u0027s stopping state (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Initialize \u0027n\u0027 before using it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for ha-\u003efw_dumped (bsc#1171688 bsc#1174003).\n- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).\n- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).\n- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).\n- Set VIRTIO_CONSOLE=y (bsc#1175667).\n- sign also s390x kernel images (bsc#1163524)\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- Update patch reference for a tipc fix patch (bsc#1175515)\n- USB: cdc-acm: rework notification_buffer resizing (git-fixes).\n- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).\n- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).\n- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- USBip: tools: fix module name in man page (git-fixes).\n- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: ftdi_sio: clean up receive processing (git-fixes).\n- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).\n- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n- USB: xhci: define IDs for various ASMedia host controllers (git-fixes).\n- USB: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- USB: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n- USB: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyperv: Create and use Hyper-V page definitions (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- x86/hyperv: Make hv_vcpu_is_preempted() visible (git-fixes).\n- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).\n- xen/balloon: make the balloon wait interruptible (bsc#1065600).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-2540,SUSE-SLE-SERVER-12-SP5-2020-2540",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2540-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:2540-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202540-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:2540-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1074701",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "self",
"summary": "SUSE Bug 1083548",
"url": "https://bugzilla.suse.com/1083548"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1085235",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1087078",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1094912",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "self",
"summary": "SUSE Bug 1100394",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "self",
"summary": "SUSE Bug 1102640",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "self",
"summary": "SUSE Bug 1105412",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1120163",
"url": "https://bugzilla.suse.com/1120163"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1144333",
"url": "https://bugzilla.suse.com/1144333"
},
{
"category": "self",
"summary": "SUSE Bug 1152148",
"url": "https://bugzilla.suse.com/1152148"
},
{
"category": "self",
"summary": "SUSE Bug 1163524",
"url": "https://bugzilla.suse.com/1163524"
},
{
"category": "self",
"summary": "SUSE Bug 1165629",
"url": "https://bugzilla.suse.com/1165629"
},
{
"category": "self",
"summary": "SUSE Bug 1166965",
"url": "https://bugzilla.suse.com/1166965"
},
{
"category": "self",
"summary": "SUSE Bug 1169790",
"url": "https://bugzilla.suse.com/1169790"
},
{
"category": "self",
"summary": "SUSE Bug 1170232",
"url": "https://bugzilla.suse.com/1170232"
},
{
"category": "self",
"summary": "SUSE Bug 1171688",
"url": "https://bugzilla.suse.com/1171688"
},
{
"category": "self",
"summary": "SUSE Bug 1172073",
"url": "https://bugzilla.suse.com/1172073"
},
{
"category": "self",
"summary": "SUSE Bug 1172108",
"url": "https://bugzilla.suse.com/1172108"
},
{
"category": "self",
"summary": "SUSE Bug 1172247",
"url": "https://bugzilla.suse.com/1172247"
},
{
"category": "self",
"summary": "SUSE Bug 1172418",
"url": "https://bugzilla.suse.com/1172418"
},
{
"category": "self",
"summary": "SUSE Bug 1172428",
"url": "https://bugzilla.suse.com/1172428"
},
{
"category": "self",
"summary": "SUSE Bug 1172781",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "self",
"summary": "SUSE Bug 1172782",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "self",
"summary": "SUSE Bug 1172783",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "self",
"summary": "SUSE Bug 1172871",
"url": "https://bugzilla.suse.com/1172871"
},
{
"category": "self",
"summary": "SUSE Bug 1172872",
"url": "https://bugzilla.suse.com/1172872"
},
{
"category": "self",
"summary": "SUSE Bug 1172873",
"url": "https://bugzilla.suse.com/1172873"
},
{
"category": "self",
"summary": "SUSE Bug 1172963",
"url": "https://bugzilla.suse.com/1172963"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1173798",
"url": "https://bugzilla.suse.com/1173798"
},
{
"category": "self",
"summary": "SUSE Bug 1173954",
"url": "https://bugzilla.suse.com/1173954"
},
{
"category": "self",
"summary": "SUSE Bug 1174003",
"url": "https://bugzilla.suse.com/1174003"
},
{
"category": "self",
"summary": "SUSE Bug 1174026",
"url": "https://bugzilla.suse.com/1174026"
},
{
"category": "self",
"summary": "SUSE Bug 1174070",
"url": "https://bugzilla.suse.com/1174070"
},
{
"category": "self",
"summary": "SUSE Bug 1174161",
"url": "https://bugzilla.suse.com/1174161"
},
{
"category": "self",
"summary": "SUSE Bug 1174205",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "self",
"summary": "SUSE Bug 1174247",
"url": "https://bugzilla.suse.com/1174247"
},
{
"category": "self",
"summary": "SUSE Bug 1174387",
"url": "https://bugzilla.suse.com/1174387"
},
{
"category": "self",
"summary": "SUSE Bug 1174484",
"url": "https://bugzilla.suse.com/1174484"
},
{
"category": "self",
"summary": "SUSE Bug 1174547",
"url": "https://bugzilla.suse.com/1174547"
},
{
"category": "self",
"summary": "SUSE Bug 1174550",
"url": "https://bugzilla.suse.com/1174550"
},
{
"category": "self",
"summary": "SUSE Bug 1174625",
"url": "https://bugzilla.suse.com/1174625"
},
{
"category": "self",
"summary": "SUSE Bug 1174658",
"url": "https://bugzilla.suse.com/1174658"
},
{
"category": "self",
"summary": "SUSE Bug 1174685",
"url": "https://bugzilla.suse.com/1174685"
},
{
"category": "self",
"summary": "SUSE Bug 1174689",
"url": "https://bugzilla.suse.com/1174689"
},
{
"category": "self",
"summary": "SUSE Bug 1174699",
"url": "https://bugzilla.suse.com/1174699"
},
{
"category": "self",
"summary": "SUSE Bug 1174734",
"url": "https://bugzilla.suse.com/1174734"
},
{
"category": "self",
"summary": "SUSE Bug 1174757",
"url": "https://bugzilla.suse.com/1174757"
},
{
"category": "self",
"summary": "SUSE Bug 1174771",
"url": "https://bugzilla.suse.com/1174771"
},
{
"category": "self",
"summary": "SUSE Bug 1174840",
"url": "https://bugzilla.suse.com/1174840"
},
{
"category": "self",
"summary": "SUSE Bug 1174841",
"url": "https://bugzilla.suse.com/1174841"
},
{
"category": "self",
"summary": "SUSE Bug 1174843",
"url": "https://bugzilla.suse.com/1174843"
},
{
"category": "self",
"summary": "SUSE Bug 1174844",
"url": "https://bugzilla.suse.com/1174844"
},
{
"category": "self",
"summary": "SUSE Bug 1174845",
"url": "https://bugzilla.suse.com/1174845"
},
{
"category": "self",
"summary": "SUSE Bug 1174852",
"url": "https://bugzilla.suse.com/1174852"
},
{
"category": "self",
"summary": "SUSE Bug 1174873",
"url": "https://bugzilla.suse.com/1174873"
},
{
"category": "self",
"summary": "SUSE Bug 1174887",
"url": "https://bugzilla.suse.com/1174887"
},
{
"category": "self",
"summary": "SUSE Bug 1174904",
"url": "https://bugzilla.suse.com/1174904"
},
{
"category": "self",
"summary": "SUSE Bug 1174926",
"url": "https://bugzilla.suse.com/1174926"
},
{
"category": "self",
"summary": "SUSE Bug 1174968",
"url": "https://bugzilla.suse.com/1174968"
},
{
"category": "self",
"summary": "SUSE Bug 1175062",
"url": "https://bugzilla.suse.com/1175062"
},
{
"category": "self",
"summary": "SUSE Bug 1175063",
"url": "https://bugzilla.suse.com/1175063"
},
{
"category": "self",
"summary": "SUSE Bug 1175064",
"url": "https://bugzilla.suse.com/1175064"
},
{
"category": "self",
"summary": "SUSE Bug 1175065",
"url": "https://bugzilla.suse.com/1175065"
},
{
"category": "self",
"summary": "SUSE Bug 1175066",
"url": "https://bugzilla.suse.com/1175066"
},
{
"category": "self",
"summary": "SUSE Bug 1175067",
"url": "https://bugzilla.suse.com/1175067"
},
{
"category": "self",
"summary": "SUSE Bug 1175112",
"url": "https://bugzilla.suse.com/1175112"
},
{
"category": "self",
"summary": "SUSE Bug 1175127",
"url": "https://bugzilla.suse.com/1175127"
},
{
"category": "self",
"summary": "SUSE Bug 1175128",
"url": "https://bugzilla.suse.com/1175128"
},
{
"category": "self",
"summary": "SUSE Bug 1175149",
"url": "https://bugzilla.suse.com/1175149"
},
{
"category": "self",
"summary": "SUSE Bug 1175199",
"url": "https://bugzilla.suse.com/1175199"
},
{
"category": "self",
"summary": "SUSE Bug 1175213",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "self",
"summary": "SUSE Bug 1175228",
"url": "https://bugzilla.suse.com/1175228"
},
{
"category": "self",
"summary": "SUSE Bug 1175232",
"url": "https://bugzilla.suse.com/1175232"
},
{
"category": "self",
"summary": "SUSE Bug 1175284",
"url": "https://bugzilla.suse.com/1175284"
},
{
"category": "self",
"summary": "SUSE Bug 1175393",
"url": "https://bugzilla.suse.com/1175393"
},
{
"category": "self",
"summary": "SUSE Bug 1175394",
"url": "https://bugzilla.suse.com/1175394"
},
{
"category": "self",
"summary": "SUSE Bug 1175396",
"url": "https://bugzilla.suse.com/1175396"
},
{
"category": "self",
"summary": "SUSE Bug 1175397",
"url": "https://bugzilla.suse.com/1175397"
},
{
"category": "self",
"summary": "SUSE Bug 1175398",
"url": "https://bugzilla.suse.com/1175398"
},
{
"category": "self",
"summary": "SUSE Bug 1175399",
"url": "https://bugzilla.suse.com/1175399"
},
{
"category": "self",
"summary": "SUSE Bug 1175400",
"url": "https://bugzilla.suse.com/1175400"
},
{
"category": "self",
"summary": "SUSE Bug 1175401",
"url": "https://bugzilla.suse.com/1175401"
},
{
"category": "self",
"summary": "SUSE Bug 1175402",
"url": "https://bugzilla.suse.com/1175402"
},
{
"category": "self",
"summary": "SUSE Bug 1175403",
"url": "https://bugzilla.suse.com/1175403"
},
{
"category": "self",
"summary": "SUSE Bug 1175404",
"url": "https://bugzilla.suse.com/1175404"
},
{
"category": "self",
"summary": "SUSE Bug 1175405",
"url": "https://bugzilla.suse.com/1175405"
},
{
"category": "self",
"summary": "SUSE Bug 1175406",
"url": "https://bugzilla.suse.com/1175406"
},
{
"category": "self",
"summary": "SUSE Bug 1175407",
"url": "https://bugzilla.suse.com/1175407"
},
{
"category": "self",
"summary": "SUSE Bug 1175408",
"url": "https://bugzilla.suse.com/1175408"
},
{
"category": "self",
"summary": "SUSE Bug 1175409",
"url": "https://bugzilla.suse.com/1175409"
},
{
"category": "self",
"summary": "SUSE Bug 1175410",
"url": "https://bugzilla.suse.com/1175410"
},
{
"category": "self",
"summary": "SUSE Bug 1175411",
"url": "https://bugzilla.suse.com/1175411"
},
{
"category": "self",
"summary": "SUSE Bug 1175412",
"url": "https://bugzilla.suse.com/1175412"
},
{
"category": "self",
"summary": "SUSE Bug 1175413",
"url": "https://bugzilla.suse.com/1175413"
},
{
"category": "self",
"summary": "SUSE Bug 1175414",
"url": "https://bugzilla.suse.com/1175414"
},
{
"category": "self",
"summary": "SUSE Bug 1175415",
"url": "https://bugzilla.suse.com/1175415"
},
{
"category": "self",
"summary": "SUSE Bug 1175416",
"url": "https://bugzilla.suse.com/1175416"
},
{
"category": "self",
"summary": "SUSE Bug 1175417",
"url": "https://bugzilla.suse.com/1175417"
},
{
"category": "self",
"summary": "SUSE Bug 1175418",
"url": "https://bugzilla.suse.com/1175418"
},
{
"category": "self",
"summary": "SUSE Bug 1175419",
"url": "https://bugzilla.suse.com/1175419"
},
{
"category": "self",
"summary": "SUSE Bug 1175420",
"url": "https://bugzilla.suse.com/1175420"
},
{
"category": "self",
"summary": "SUSE Bug 1175421",
"url": "https://bugzilla.suse.com/1175421"
},
{
"category": "self",
"summary": "SUSE Bug 1175422",
"url": "https://bugzilla.suse.com/1175422"
},
{
"category": "self",
"summary": "SUSE Bug 1175423",
"url": "https://bugzilla.suse.com/1175423"
},
{
"category": "self",
"summary": "SUSE Bug 1175440",
"url": "https://bugzilla.suse.com/1175440"
},
{
"category": "self",
"summary": "SUSE Bug 1175493",
"url": "https://bugzilla.suse.com/1175493"
},
{
"category": "self",
"summary": "SUSE Bug 1175515",
"url": "https://bugzilla.suse.com/1175515"
},
{
"category": "self",
"summary": "SUSE Bug 1175518",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "self",
"summary": "SUSE Bug 1175526",
"url": "https://bugzilla.suse.com/1175526"
},
{
"category": "self",
"summary": "SUSE Bug 1175550",
"url": "https://bugzilla.suse.com/1175550"
},
{
"category": "self",
"summary": "SUSE Bug 1175654",
"url": "https://bugzilla.suse.com/1175654"
},
{
"category": "self",
"summary": "SUSE Bug 1175666",
"url": "https://bugzilla.suse.com/1175666"
},
{
"category": "self",
"summary": "SUSE Bug 1175667",
"url": "https://bugzilla.suse.com/1175667"
},
{
"category": "self",
"summary": "SUSE Bug 1175668",
"url": "https://bugzilla.suse.com/1175668"
},
{
"category": "self",
"summary": "SUSE Bug 1175669",
"url": "https://bugzilla.suse.com/1175669"
},
{
"category": "self",
"summary": "SUSE Bug 1175670",
"url": "https://bugzilla.suse.com/1175670"
},
{
"category": "self",
"summary": "SUSE Bug 1175767",
"url": "https://bugzilla.suse.com/1175767"
},
{
"category": "self",
"summary": "SUSE Bug 1175768",
"url": "https://bugzilla.suse.com/1175768"
},
{
"category": "self",
"summary": "SUSE Bug 1175769",
"url": "https://bugzilla.suse.com/1175769"
},
{
"category": "self",
"summary": "SUSE Bug 1175770",
"url": "https://bugzilla.suse.com/1175770"
},
{
"category": "self",
"summary": "SUSE Bug 1175771",
"url": "https://bugzilla.suse.com/1175771"
},
{
"category": "self",
"summary": "SUSE Bug 1175772",
"url": "https://bugzilla.suse.com/1175772"
},
{
"category": "self",
"summary": "SUSE Bug 1175786",
"url": "https://bugzilla.suse.com/1175786"
},
{
"category": "self",
"summary": "SUSE Bug 1175873",
"url": "https://bugzilla.suse.com/1175873"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14314 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14356 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16166 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1749 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24394/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2020-09-04T15:36:05Z",
"generator": {
"date": "2020-09-04T15:36:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:2540-1",
"initial_release_date": "2020-09-04T15:36:05Z",
"revision_history": [
{
"date": "2020-09-04T15:36:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.25.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.25.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.25.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.25.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.25.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.25.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.25.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.25.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.25.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.25.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.25.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.25.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2020-14314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14314"
}
],
"notes": [
{
"category": "general",
"text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14314",
"url": "https://www.suse.com/security/cve/CVE-2020-14314"
},
{
"category": "external",
"summary": "SUSE Bug 1173798 for CVE-2020-14314",
"url": "https://bugzilla.suse.com/1173798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-14314"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14356"
}
],
"notes": [
{
"category": "general",
"text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14356",
"url": "https://www.suse.com/security/cve/CVE-2020-14356"
},
{
"category": "external",
"summary": "SUSE Bug 1175213 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "external",
"summary": "SUSE Bug 1176392 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1176392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-14356"
},
{
"cve": "CVE-2020-16166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16166"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16166",
"url": "https://www.suse.com/security/cve/CVE-2020-16166"
},
{
"category": "external",
"summary": "SUSE Bug 1174757 for CVE-2020-16166",
"url": "https://bugzilla.suse.com/1174757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2020-16166"
},
{
"cve": "CVE-2020-1749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1749"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1749",
"url": "https://www.suse.com/security/cve/CVE-2020-1749"
},
{
"category": "external",
"summary": "SUSE Bug 1165629 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1165629"
},
{
"category": "external",
"summary": "SUSE Bug 1165631 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1165631"
},
{
"category": "external",
"summary": "SUSE Bug 1177511 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1177511"
},
{
"category": "external",
"summary": "SUSE Bug 1177513 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1177513"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-1749",
"url": "https://bugzilla.suse.com/1189302"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2020-1749"
},
{
"cve": "CVE-2020-24394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24394"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24394",
"url": "https://www.suse.com/security/cve/CVE-2020-24394"
},
{
"category": "external",
"summary": "SUSE Bug 1175518 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "external",
"summary": "SUSE Bug 1175992 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.25.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.25.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-04T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2020-24394"
}
]
}
SUSE-SU-2019:0148-1
Vulnerability from csaf_suse - Published: 2019-01-23 16:57 - Updated: 2019-01-23 16:57Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": " The SUSE Linux Enterprise 12 SP3 kernel for Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic was uninitialized (bnc#1116841).\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bnc#1087082).\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).\n- CVE-2017-16939: The XFRM dump policy implementation in net/xfrm/xfrm_user.c allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages (bnc#1069702).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).\n- CVE-2018-16862: A security flaw was found in the way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n\nThe following non-security bugs were fixed:\n\n- 9p: clear dangling pointers in p9stat_free (bnc#1012382).\n- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).\n- 9p/net: put a lower bound on msize (bnc#1012382).\n- ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).\n- ACPI/LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).\n- ACPI/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).\n- ACPI/nfit, x86/mce: Validate a MCE\u0027s address before using it (bsc#1114648).\n- ACPI/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).\n- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).\n- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).\n- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).\n- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).\n- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).\n- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).\n- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).\n- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).\n- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).\n- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).\n- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).\n- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).\n- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).\n- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).\n- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).\n- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).\n- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).\n- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).\n- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).\n- ALSA: trident: Suppress gcc string warning (bnc#1012382).\n- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).\n- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).\n- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).\n- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n- ARC: change defconfig defaults to ARCv2 (bnc#1012382).\n- ARC: [devboards] Add support of NFSv3 ACL (bnc#1012382).\n- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).\n- ARC: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).\n- ARM64: Disable asm-operand-width warning for clang (bnc#1012382).\n- ARM64: dts: stratix10: Correct System Manager register size (bnc#1012382).\n- ARM64: Enabled ENA (Amazon network driver)\n- ARM64: hardcode rodata_enabled=true earlier in the series (bsc#1114763). \n- ARM64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code.\n- ARM64: percpu: Initialize ret in the default case (bnc#1012382).\n- ARM64: remove no-op -p linker flag (bnc#1012382).\n- ARM: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).\n- ARM: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).\n- ARM: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).\n- ARM: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).\n- ARM: fix mis-applied iommu identity check (bsc#1116924).\n- ARM: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).\n- ARM: kvm: fix building with gcc-8 (bsc#1121241).\n- ARM: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).\n- ARM: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).\n- asix: Check for supported Wake-on-LAN modes (bnc#1012382).\n- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).\n- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).\n- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).\n- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).\n- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).\n- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).\n- ataflop: fix error handling during setup (bnc#1012382).\n- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).\n- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).\n- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).\n- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).\n- b43: Fix error in cordic routine (bnc#1012382).\n- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).\n- bcache: fix miss key refill-\u003eend in writeback (bnc#1012382).\n- bfs: add sanity check at bfs_fill_super() (bnc#1012382).\n- binfmt_elf: fix calculations for bss padding (bnc#1012382).\n- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).\n- block: fix inheriting request priority from bio (bsc#1116924).\n- block: respect virtual boundary mask in bvecs (bsc#1113412).\n- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).\n- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).\n- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).\n- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).\n- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).\n- bpf: generally move prog destruction to RCU deferral (bnc#1012382).\n- bpf: support 8-byte metafield access (bnc#1012382).\n- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).\n- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).\n- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).\n- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).\n- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).\n- btrfs: Always try all copies when reading extent buffers (bnc#1012382).\n- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).\n- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).\n- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).\n- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).\n- btrfs: Fix memory barriers usage with device stats counters.\n- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).\n- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).\n- btrfs: fix use-after-free when dumping free space (bnc#1012382).\n- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).\n- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol.\n- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).\n- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).\n- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).\n- btrfs: make sure we create all new block groups (bnc#1012382).\n- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).\n- btrfs: release metadata before running delayed refs (bnc#1012382).\n- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).\n- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).\n- btrfs: set max_extent_size properly (bnc#1012382).\n- btrfs: wait on caching when putting the bg cache (bnc#1012382).\n- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).\n- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).\n- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).\n- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).\n- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).\n- can: rcar_can: Fix erroneous registration (bnc#1012382).\n- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).\n- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).\n- ceph: do not update importing cap\u0027s mseq when handing cap export (bsc#1121275).\n- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).\n- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).\n- checkstack.pl: fix for aarch64 (bnc#1012382).\n- CIFS: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).\n- CIFS: Fix separator when building path from dentry (bnc#1012382).\n- CIFS: handle guest access errors to Windows shares (bnc#1012382).\n- CIFS: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).\n- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).\n- clk: s2mps11: Add used attribute to s2mps11_dt_match.\n- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).\n- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).\n- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).\n- configfs: replace strncpy with memcpy (bnc#1012382).\n- cpufeature: avoid warning when compiling with clang.\n- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).\n- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).\n- Cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).\n- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).\n- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).\n- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).\n- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).\n- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).\n- cw1200: Do not leak memory if krealloc failes (bnc#1012382).\n- cxgb4: Add support for new flash parts (bsc#1102439).\n- cxgb4: assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1102439).\n- cxgb4: Fix FW flash errors (bsc#1102439).\n- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).\n- cxgb4: support new ISSI flash parts (bsc#1102439).\n- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).\n- disable stringop truncation warnings for now (bnc#1012382).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).\n- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).\n- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).\n- dmaengine: at_hdmac: fix module unloading (bnc#1012382).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).\n- dm cache metadata: ignore hints array being too small during resize.\n- dm ioctl: harden copy_params()\u0027s copy_from_user() from malicious users (bnc#1012382).\n- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).\n- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).\n- dm thin: stop no_space_timeout worker when switching to write-mode.\n- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).\n- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).\n- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).\n- drivers/sbus/char: add of_node_put() (bnc#1012382).\n- drivers/tty: add missing of_node_put() (bnc#1012382).\n- drm/ast: change resolution may cause screen blurred (bnc#1012382).\n- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).\n- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).\n- drm/ast: Fix incorrect free on ioregs (bsc#1106929)\n- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n- drm/dp_mst: Check if primary mstb is null (bnc#1012382).\n- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)\n- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).\n- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).\n- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).\n- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).\n- drm: rcar-du: Fix external clock error checks (bsc#1106929)\n- drm: rcar-du: Fix vblank initialization (bsc#1106929)\n- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).\n- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).\n- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).\n- efi/libstub/arm64: Force \u0027hidden\u0027 visibility for section markers (bnc#1012382).\n- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).\n- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).\n- exportfs: do not read dentry after free (bnc#1012382).\n- ext2: fix potential use after free (bnc#1012382).\n- ext4: add missing brelse() add_new_gdb_meta_bg()\u0027s error path (bnc#1012382).\n- ext4: add missing brelse() in set_flexbg_block_bitmap()\u0027s error path (bnc#1012382).\n- ext4: add missing brelse() update_backups()\u0027s error path (bnc#1012382).\n- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).\n- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).\n- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).\n- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).\n- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).\n- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).\n- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).\n- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).\n- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).\n- ext4: fix possible leak of sbi-\u003es_group_desc_leak in error path (bnc#1012382).\n- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).\n- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).\n- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).\n- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).\n- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).\n- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)\n- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)\n- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).\n- Fix kABI for \u0027Ensure we commit after writeback is complete\u0027 (bsc#1111809).\n- floppy: fix race condition in __floppy_read_block_0().\n- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).\n- fork: record start_time late (bnc#1012382).\n- fscache, cachefiles: remove redundant variable \u0027cache\u0027 (bnc#1012382).\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- fscache: Fix race in fscache_op_complete() due to split atomic_sub \u0026 read .\n- fscache: Pass the correct cancelled indications to fscache_op_complete().\n- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).\n- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).\n- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).\n- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).\n- fuse: fix blocked_waitq wakeup (bnc#1012382).\n- fuse: fix leaked notify reply (bnc#1012382).\n- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).\n- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).\n- fuse: set FR_SENT while locked (bnc#1012382).\n- genirq: Fix race on spurious interrupt detection (bnc#1012382).\n- genwqe: Fix size check (bnc#1012382).\n- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).\n- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).\n- gfs2_meta: -\u003emount() can get NULL dev_name (bnc#1012382).\n- gfs2: Put bitmap buffers in put_super (bnc#1012382).\n- git_sort.py: Remove non-existent remote tj/libata\n- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).\n- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).\n- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).\n- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).\n- hfs: do not free node before using (bnc#1012382).\n- hfsplus: do not free node before using (bnc#1012382).\n- hfsplus: prevent btree data loss on root split (bnc#1012382).\n- hfs: prevent btree data loss on root split (bnc#1012382).\n- HID: hiddev: fix potential Spectre v1 (bnc#1012382).\n- HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).\n- hpwdt add dynamic debugging (bsc#1114417).\n- hpwdt calculate reload value on each use (bsc#1114417).\n- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).\n- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).\n- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).\n- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).\n- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).\n- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).\n- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- i2c: axxia: properly handle master timeout (bnc#1012382).\n- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).\n- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).\n- ibmvnic: Convert reset work item mutex to spin lock ().\n- ibmvnic: fix accelerated VLAN handling ().\n- ibmvnic: fix index in release_rx_pools (bsc#1115440).\n- ibmvnic: Fix non-atomic memory allocation in IRQ context ().\n- ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).\n- ibmvnic: remove ndo_poll_controller ().\n- ibmvnic: Update driver queues after change in ring size support ().\n- IB/ucm: Fix Spectre v1 vulnerability (bnc#1012382).\n- ide: pmac: add of_node_put() (bnc#1012382).\n- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).\n- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).\n- ima: fix showing large \u0027violations\u0027 or \u0027runtime_measurements_count\u0027 (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).\n- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).\n- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).\n- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).\n- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).\n- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).\n- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).\n- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).\n- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).\n- Input: xpad - add more third-party controllers (bnc#1012382).\n- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).\n- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).\n- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).\n- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).\n- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).\n- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).\n- Input: xpad - constify usb_device_id (bnc#1012382).\n- Input: xpad - correctly sort vendor id\u0027s (bnc#1012382).\n- Input: xpad - correct xbox one pad device name (bnc#1012382).\n- Input: xpad - do not depend on endpoint order (bnc#1012382).\n- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).\n- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).\n- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).\n- Input: xpad - fix some coding style issues (bnc#1012382).\n- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).\n- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).\n- Input: xpad - handle \u0027present\u0027 and \u0027gone\u0027 correctly (bnc#1012382).\n- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).\n- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).\n- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).\n- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).\n- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).\n- Input: xpad - remove unused function (bnc#1012382).\n- Input: xpad - restore LED state after device resume (bnc#1012382).\n- Input: xpad - simplify error condition in init_output (bnc#1012382).\n- Input: xpad - sort supported devices by USB ID (bnc#1012382).\n- Input: xpad - support some quirky Xbox One pads (bnc#1012382).\n- Input: xpad - sync supported devices with 360Controller (bnc#1012382).\n- Input: xpad - sync supported devices with XBCD (bnc#1012382).\n- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).\n- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).\n- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).\n- Input: xpad - validate USB endpoint type during probe (bnc#1012382).\n- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).\n- Input: xpad - xbox one elite controller support (bnc#1012382).\n- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).\n- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).\n- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).\n- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ipmi: Fix timer race with module unload (bnc#1012382).\n- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).\n- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).\n- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).\n- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).\n- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).\n- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).\n- ipv6: orphan skbs in reassembly unit (bnc#1012382).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).\n- iser: set sector for ambiguous mr status errors (bnc#1012382).\n- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).\n- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).\n- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).\n- ixgbe: Add support for build_skb (bsc#1100105).\n- ixgbe: Add support for padding packet (bsc#1100105).\n- ixgbe: Break out Rx buffer page management (bsc#1100105).\n- ixgbe: Fix output from ixgbe_dump (bsc#1100105).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).\n- ixgbe: Only DMA sync frame length (bsc#1100105).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: Update code to better handle incrementing page count (bsc#1100105).\n- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).\n- ixgbe: Use length to determine if descriptor is done (bsc#1100105).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).\n- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).\n- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- kABI: protect get_vaddr_frames (kabi).\n- kABI: protect struct azx (kabi).\n- kABI: protect struct cfs_bandwidth (kabi).\n- kABI: protect struct esp (kabi).\n- kABI: protect struct fuse_io_priv (kabi).\n- kABI: protect __usb_get_extra_descriptor (kabi).\n- kABI: protect xen/xen-ops.h include in xlate_mmu.c (kabi).\n- kabi: revert sig change on pnfs_read_resend_pnfs.\n- kbuild: Add better clang cross build support (bnc#1012382).\n- kbuild: Add __cc-option macro (bnc#1012382).\n- kbuild: Add support to generate LLVM assembly files (bnc#1012382).\n- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).\n- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).\n- kbuild: clang: Disable \u0027address-of-packed-member\u0027 warning (bnc#1012382).\n- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).\n- kbuild: clang: fix build failures with sparse check (bnc#1012382).\n- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).\n- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).\n- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).\n- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).\n- kbuild: fix asm-offset generation to work with clang (bnc#1012382).\n- kbuild: fix kernel/bounds.c \u0027W=1\u0027 warning (bnc#1012382).\n- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).\n- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).\n- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).\n- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).\n- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).\n- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).\n- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).\n- kdb: use memmove instead of overlapping memcpy (bnc#1012382).\n- kdb: Use strscpy with destination buffer size (bnc#1012382).\n- kernfs: Replace strncpy with memcpy (bnc#1012382).\n- KEYS: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).\n- kgdboc: Fix restrict error (bnc#1012382).\n- kgdboc: Fix warning with module build (bnc#1012382).\n- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).\n- kobject: Replace strncpy with memcpy (bnc#1012382).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).\n- KVM: arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).\n- KVM: arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).\n- KVM: mmu: Fix race in emulated page table writes (bnc#1012382).\n- KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).\n- KVM: nVMX: Eliminate vmcs02 pool (bnc#1012382).\n- KVM: nVMX: mark vmcs12 pages dirty on L2 exit (bnc#1012382).\n- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).\n- KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).\n- KVM/SVM: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).\n- KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).\n- KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).\n- KVM/VMX: introduce alloc_loaded_vmcs (bnc#1012382).\n- KVM/VMX: make MSR bitmaps per-VCPU (bnc#1012382).\n- KVM/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).\n- KVM/x86: fix empty-body warnings (bnc#1012382).\n- KVM/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).\n- KVM/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).\n- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).\n- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).\n- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).\n- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).\n- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).\n- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n- libceph: fall back to sendmsg for slab pages (bsc#1118316).\n- libfc: sync strings with upstream versions (bsc#1114763).\n- lib/interval_tree_test.c: allow full tree search (bnc#1012382).\n- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).\n- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).\n- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).\n- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).\n- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).\n- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).\n- lib/raid6: Fix arm64 test build (bnc#1012382).\n- lib/rbtree_test.c: make input module parameters (bnc#1012382).\n- lib/rbtree-test: lower default params (bnc#1012382).\n- llc: do not use sk_eat_skb() (bnc#1012382).\n- lockd: fix access beyond unterminated strings in prints (bnc#1012382).\n- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).\n- mac80211: Always report TX status (bnc#1012382).\n- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).\n- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).\n- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).\n- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).\n- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).\n- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).\n- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).\n- mach64: fix display corruption on big endian machines (bnc#1012382).\n- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).\n- matroxfb: fix size of memcpy (bnc#1012382).\n- MD: do not check MD_SB_CHANGE_CLEAN in md_allow_write.\n- MD: fix invalid stored role for a disk (bnc#1012382).\n- MD: fix invalid stored role for a disk - try2 (bnc#1012382).\n- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).\n- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).\n- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).\n- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).\n- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).\n- media: pci: cx23885: handle adding to list failure (bnc#1012382).\n- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).\n- media: v4l: event: Add subscription to list before calling \u0027add\u0027 operation (bnc#1012382).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).\n- MIPS: Align kernel load address to 64KB (bnc#1012382).\n- MIPS: DEC: Fix an int-handler.S CPU_DADDI_WORKAROUNDS regression (bnc#1012382).\n- MIPS: Ensure pmd_present() returns false after pmd_mknotpresent() (bnc#1012382).\n- MIPS: Fix FCSR Cause bit handling for correct SIGFPE issue (bnc#1012382).\n- MIPS: fix mips_get_syscall_arg o32 check (bnc#1012382).\n- MIPS: Handle non word sized instructions when examining frame (bnc#1012382).\n- MIPS: kexec: Mark CPU offline before disabling local IRQ (bnc#1012382).\n- MIPS: Loongson-3: Fix BRIDGE irq delivery problem (bnc#1012382).\n- MIPS: Loongson-3: Fix CPU UART irq delivery problem (bnc#1012382).\n- MIPS: microMIPS: Fix decoding of swsp16 instruction (bnc#1012382).\n- MIPS: OCTEON: fix out of bounds array access on CN68XX (bnc#1012382).\n- MIPS: ralink: Fix mt7620 nd_sd pinmux (bnc#1012382).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).\n- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).\n- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).\n- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).\n- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).\n- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).\n- mm, devm_memremap_pages: kill mapping \u0027System RAM\u0027 support (bnc#1012382).\n- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).\n- mm: do not miss the last page because of round-off error (bnc#1118798).\n- mm, elf: handle vm_brk error (bnc#1012382).\n- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).\n- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).\n- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).\n- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).\n- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).\n- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).\n- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).\n- mm: mlock: avoid increase mm-\u003elocked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).\n- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).\n- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).\n- mm: print more information about mapping in __dump_page (generic hotplug debugability).\n- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).\n- mm: refuse wrapped vm_brk requests (bnc#1012382).\n- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).\n- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).\n- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).\n- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).\n- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).\n- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).\n- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).\n- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).\n- Move usb-audio UAF fix into sorted section\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).\n- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).\n- mv88e6060: disable hardware level MAC learning (bnc#1012382).\n- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).\n- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).\n- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (bnc#1012382).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).\n- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).\n- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).\n- net: amd: add missing of_node_put() (bnc#1012382).\n- net: bcmgenet: fix OF child-node lookup (bnc#1012382).\n- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).\n- net: cxgb3_main: fix a missing-check bug (bnc#1012382).\n- net: drop skb on failure in ip_check_defrag() (bnc#1012382).\n- net: drop write-only stack variable (bnc#1012382).\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).\n- net: ena: complete host info to match latest ENA spec (bsc#1117562).\n- net: ena: enable Low Latency Queues (bsc#1117562).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).\n- net: ena: fix auto casting to boolean (bsc#1117562).\n- net: ena: fix compilation error in xtensa architecture (bsc#1117562).\n- net: ena: fix crash during ena_remove() (bsc#1108240).\n- net: ena: fix crash during failed resume from hibernation (bsc#1117562).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).\n- net: ena: minor performance improvement (bsc#1117562).\n- net: ena: remove ndo_poll_controller (bsc#1117562).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).\n- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).\n- net: ena: update driver version to 2.0.1 (bsc#1117562).\n- net: ena: use CSUM_CHECKED device indication to report skb\u0027s checksum status (bsc#1117562).\n- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).\n- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).\n- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).\n- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).\n- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).\n- net-gro: reset skb-\u003epkt_type in napi_reuse_skb() (bnc#1012382).\n- net: hisilicon: remove unexpected free_netdev (bnc#1012382).\n- net: ibm: fix return type of ndo_start_xmit function ().\n- net/ibmnvic: Fix deadlock problem in reset ().\n- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n- net/ipv4: defensive cipso option parsing (bnc#1012382).\n- net/ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).\n- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).\n- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).\n- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).\n- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).\n- net: Prevent invalid access to skb-\u003eprev in __qdisc_drop_all (bnc#1012382).\n- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).\n- netrom: fix locking in nr_find_socket() (bnc#1012382).\n- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).\n- net: socket: fix a missing-check bug (bnc#1012382).\n- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).\n- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).\n- new helper: uaccess_kernel() (bnc#1012382).\n- NFC: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).\n- nfit: skip region registration for incomplete control regions (bsc#1118930).\n- nfsd: Fix an Oops in free_session() (bnc#1012382).\n- NFS: Ensure we commit after writeback is complete (bsc#1111809).\n- NFSv4.1: Fix the r/wsize checking (bnc#1012382).\n- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING.\n- nvme: validate controller state before rescheduling keep alive (bsc#1103257).\n- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).\n- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).\n- ocfs2: fix potential use after free (bnc#1012382).\n- of: add helper to lookup compatible child node (bnc#1012382).\n- packet: validate address length (bnc#1012382).\n- packet: validate address length if non-zero (bnc#1012382).\n- parisc: Fix address in HPMC IVA (bnc#1012382).\n- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).\n- PCI: Add Device IDs for Intel GPU \u0027spurious interrupt\u0027 quirk (bnc#1012382).\n- PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).\n- PCI/ASPM: Fix link_state teardown on device removal (bsc#1109806).\n- PCI: vmd: Detach resources after stopping root bus (bsc#1106105).\n- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).\n- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).\n- perf/core: Do not leak event in the syscall error path (bnc#1012382).\n- perf pmu: Suppress potential format-truncation warning (bnc#1012382).\n- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).\n- perf tools: Cleanup trace-event-info \u0027tdata\u0027 leak (bnc#1012382).\n- perf tools: Disable parallelism for \u0027make clean\u0027 (bnc#1012382).\n- perf tools: Free temporary \u0027sys\u0027 string in read_event_files() (bnc#1012382).\n- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).\n- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).\n- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).\n- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).\n- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).\n- PM / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).\n- pNFS: Fix a deadlock between read resends and layoutreturn.\n- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path.\n- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io.\n- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs.\n- powerpc/64s: consolidate MCE counter increment (bsc#1094244).\n- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).\n- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).\n- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).\n- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).\n- powerpc/mm/radix: Use mm-\u003etask_size for boundary checking instead of addr_limit (bsc#1027457).\n- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).\n- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).\n- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).\n- powerpc/numa: Suppress \u0027VPHN is not supported\u0027 messages (bnc#1012382).\n- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).\n- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).\n- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).\n- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).\n- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).\n- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).\n- power: supply: olpc_battery: correct the temperature units (bnc#1012382).\n- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).\n- Provide a temporary fix for STIBP on-by-default (bsc#1116497).\n- pstore: Convert console write to use -\u003ewrite_buf (bnc#1012382).\n- ptp: fix Spectre v1 vulnerability (bnc#1012382).\n- pxa168fb: prepare the clock (bnc#1012382).\n- qed: Fix bitmap_weight() check (bsc#1019695).\n- qed: Fix PTT leak in qed_drain() (bnc#1012382).\n- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).\n- qed: Fix reading wrong value in loop condition (bnc#1012382).\n- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).\n- r8169: fix NAPI handling under high load (bnc#1012382).\n- rapidio/rionet: do not free skb before reading its length (bnc#1012382).\n- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).\n- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).\n- Reorder a few commits in kGraft out of tree section\n- Revert \u0027Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV\u0027 (bnc#1012382).\n- Revert \u0027ceph: fix dentry leak in splice_dentry()\u0027 (bsc#1114839).\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1106929)\n- Revert \u0027exec: avoid gcc-8 warning for get_task_comm\u0027 (kabi).\n- Revert \u0027iommu/io-pgtable-arm: Check for v7s-incapable systems\u0027 (bsc#1106105).\n- Revert \u0027media: v4l: event: Add subscription to list before calling \u0027add\u0027 operation\u0027 (kabi).\n- Revert \u0027media: videobuf2-core: do not call memop \u0027finish\u0027 when queueing\u0027 (bnc#1012382).\n- Revert \u0027PCI/ASPM: Do not initialize link state when aspm_disabled is set\u0027 (bsc#1106105).\n- Revert \u0027usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half\u0027 (bsc#1047487).\n- Revert \u0027wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()\u0027 (bnc#1012382).\n- Revert \u0027x86/kconfig: Fall back to ticket spinlocks\u0027 (kabi).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).\n- rpcrdma: Add RPCRDMA_HDRLEN_ERR.\n- rpm/kernel-binary.spec.in: Add missing export BRP_SIGN_FILES (bsc#1115587). \n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).\n- rtc: hctosys: Add missing range error reporting (bnc#1012382).\n- rtc: snvs: add a missing write sync (bnc#1012382).\n- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).\n- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).\n- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).\n- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).\n- s390/mm: Fix ERROR: \u0027__node_distance\u0027 undefined! (bnc#1012382).\n- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).\n- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).\n- s390/qeth: fix length check in SNMP processing (bnc#1012382).\n- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).\n- s390/vdso: add missing FORCE to build targets (bnc#1012382).\n- sbus: char: add of_node_put() (bnc#1012382).\n- sc16is7xx: Fix for multi-channel stall (bnc#1012382).\n- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).\n- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).\n- sch_red: update backlog as well (bnc#1012382).\n- scsi: aacraid: Fix typo in blink status (bnc#1012382).\n- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).\n- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).\n- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).\n- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).\n- scsi: Introduce scsi_start_queue() (bsc#1119877).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).\n- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).\n- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).\n- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).\n- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).\n- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).\n- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).\n- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).\n- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).\n- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).\n- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).\n- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).\n- scsi: Split scsi_internal_device_block() (bsc#1119877).\n- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).\n- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).\n- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).\n- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).\n- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).\n- scsi: ufshcd: release resources if probe fails (bnc#1012382).\n- scsi: use \u0027inquiry_mutex\u0027 instead of \u0027state_mutex\u0027 (bsc#1119877).\n- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).\n- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).\n- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).\n- sctp: fix race on sctp_id2asoc (bnc#1012382).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).\n- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).\n- selftests: Move networking/timestamping from Documentation (bnc#1012382).\n- seq_file: fix incomplete reset on read from zero offset.\n- ser_gigaset: use container_of() instead of detour (bnc#1012382).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).\n- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).\n- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).\n- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).\n- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).\n- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).\n- sock: Make sock-\u003esk_stamp thread-safe (bnc#1012382).\n- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).\n- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).\n- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).\n- sparc: Fix single-pcr perf event counter management (bnc#1012382).\n- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).\n- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).\n- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).\n- spi: bcm2835: Fix race on DMA termination (bnc#1012382).\n- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).\n- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).\n- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).\n- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).\n- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).\n- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).\n- Staging: lustre: remove two build warnings (bnc#1012382).\n- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).\n- staging: speakup: Replace strncpy with memcpy (bnc#1012382).\n- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).\n- SUNRPC: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).\n- SUNRPC: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).\n- SUNRPC: Fix a potential race in xprt_connect().\n- SUNRPC: fix cache_head leak due to queued request (bnc#1012382).\n- SUNRPC: Fix leak of krb5p encode pages (bnc#1012382).\n- svcrdma: Remove unused variable in rdma_copy_tail().\n- swim: fix cleanup on setup error (bnc#1012382).\n- swiotlb: clean up reporting (bnc#1012382).\n- sysv: return \u0027err\u0027 instead of 0 in __sysv_write_inode (bnc#1012382).\n- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).\n- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).\n- tcp: fix NULL ref in tail loss probe (bnc#1012382).\n- TC: Set DMA masks for devices (bnc#1012382).\n- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).\n- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).\n- thermal: allow spear-thermal driver to be a module (bnc#1012382).\n- thermal: allow u8500-thermal driver to be a module (bnc#1012382).\n- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).\n- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).\n- tpm: fix response size validation in tpm_get_random() (bsc#1020645).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).\n- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).\n- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).\n- tracing: Fix memory leak of instance function hash filters (bnc#1012382).\n- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).\n- tty: check name length in tty_find_polling_driver() (bnc#1012382).\n- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).\n- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).\n- tty: wipe buffer (bnc#1012382).\n- tty: wipe buffer if not echoing data (bnc#1012382).\n- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).\n- tun: forbid iface creation with rtnl ops (bnc#1012382).\n- uio: ensure class is registered before devices (bnc#1012382).\n- uio: Fix an Oops on load (bnc#1012382).\n- uio: make symbol \u0027uio_class_registered\u0027 static.\n- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).\n- um: Give start_idle_thread() a return code (bnc#1012382).\n- unifdef: use memcpy instead of strncpy (bnc#1012382).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).\n- usb: appledisplay: Add 27\u0027 Apple Cinema Display (bnc#1012382).\n- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).\n- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).\n- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).\n- usb: core: Fix hub port connection events lost (bnc#1012382).\n- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).\n- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).\n- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).\n- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).\n- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).\n- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).\n- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).\n- usb: misc: appledisplay: add 20\u0027 Apple Cinema Display (bnc#1012382).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).\n- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).\n- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).\n- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).\n- usb: omap_udc: use devm_request_irq() (bnc#1012382).\n- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).\n- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).\n- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).\n- usb: serial: option: add Fibocom NL678 series (bnc#1012382).\n- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).\n- usb: serial: option: add HP lt4132 (bnc#1012382).\n- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).\n- usb: serial: option: add Telit LN940 series (bnc#1012382).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).\n- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).\n- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).\n- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).\n- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).\n- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).\n- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).\n- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).\n- vhost: Fix Spectre V1 vulnerability (bnc#1012382).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).\n- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).\n- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).\n- virtio/s390: avoid race on vcdev-\u003econfig (bnc#1012382).\n- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).\n- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).\n- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).\n- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).\n- x86: boot: Fix EFI stub alignment (bnc#1012382).\n- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).\n- x86/build: Fix stack alignment for CLang (bnc#1012382).\n- x86/build: Specify stack alignment for clang (bnc#1012382).\n- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).\n- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).\n- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).\n- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).\n- x86/entry: spell EBX register correctly in documentation (bnc#1012382).\n- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).\n- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).\n- x86/MCE: Export memory_error() (bsc#1114648).\n- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).\n- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).\n- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).\n- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).\n- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).\n- xen/balloon: Support xend-based toolstack (bnc#1065600).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen: fix race in xen_qlock_wait() (bnc#1012382).\n- xen: fix xen_qlock_wait() (bnc#1012382).\n- xen: make xen_qlock_wait() nestable (bnc#1012382).\n- xen/netback: dont overflow meta array (bnc#1099523).\n- xen/netfront: tolerate frags with no data (bnc#1012382).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xen: xlate_mmu: add missing header to fix \u0027W=1\u0027 warning (bnc#1012382).\n- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).\n- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).\n- xfrm: Fix bucket count reported to userspace (bnc#1012382).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).\n- xfrm: validate template mode (bnc#1012382).\n- xfs: Align compat attrlist_by_handle with native implementation.\n- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).\n- xfs: Fix error code in \u0027xfs_ioc_getbmap()\u0027.\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).\n- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).\n- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).\n- xprtrdma: checking for NULL instead of IS_ERR().\n- xprtrdma: Disable pad optimization by default.\n- xprtrdma: Disable RPC/RDMA backchannel debugging messages.\n- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock).\n- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps.\n- xprtrdma: Fix Read chunk padding.\n- xprtrdma: Fix receive buffer accounting.\n- xprtrdma: Reset credit grant properly after a disconnect.\n- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len.\n- xprtrdma: Serialize credit accounting again.\n- xprtrdma: xprt_rdma_free() must not release backchannel reqs.\n- xtensa: add NOTES section to the linker script (bnc#1012382).\n- xtensa: enable coprocessors that are being flushed (bnc#1012382).\n- xtensa: fix boot parameters address translation (bnc#1012382).\n- xtensa: fix coprocessor context offset definitions (bnc#1012382).\n- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).\n- zram: close udev startup race condition as default groups (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-148,SUSE-SLE-SERVER-12-SP3-2019-148",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0148-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:0148-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190148-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:0148-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1015336",
"url": "https://bugzilla.suse.com/1015336"
},
{
"category": "self",
"summary": "SUSE Bug 1015337",
"url": "https://bugzilla.suse.com/1015337"
},
{
"category": "self",
"summary": "SUSE Bug 1015340",
"url": "https://bugzilla.suse.com/1015340"
},
{
"category": "self",
"summary": "SUSE Bug 1019683",
"url": "https://bugzilla.suse.com/1019683"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1020645",
"url": "https://bugzilla.suse.com/1020645"
},
{
"category": "self",
"summary": "SUSE Bug 1027260",
"url": "https://bugzilla.suse.com/1027260"
},
{
"category": "self",
"summary": "SUSE Bug 1027457",
"url": "https://bugzilla.suse.com/1027457"
},
{
"category": "self",
"summary": "SUSE Bug 1042286",
"url": "https://bugzilla.suse.com/1042286"
},
{
"category": "self",
"summary": "SUSE Bug 1043083",
"url": "https://bugzilla.suse.com/1043083"
},
{
"category": "self",
"summary": "SUSE Bug 1046264",
"url": "https://bugzilla.suse.com/1046264"
},
{
"category": "self",
"summary": "SUSE Bug 1047487",
"url": "https://bugzilla.suse.com/1047487"
},
{
"category": "self",
"summary": "SUSE Bug 1048916",
"url": "https://bugzilla.suse.com/1048916"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1069702",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "self",
"summary": "SUSE Bug 1070805",
"url": "https://bugzilla.suse.com/1070805"
},
{
"category": "self",
"summary": "SUSE Bug 1079935",
"url": "https://bugzilla.suse.com/1079935"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1091405",
"url": "https://bugzilla.suse.com/1091405"
},
{
"category": "self",
"summary": "SUSE Bug 1093158",
"url": "https://bugzilla.suse.com/1093158"
},
{
"category": "self",
"summary": "SUSE Bug 1094244",
"url": "https://bugzilla.suse.com/1094244"
},
{
"category": "self",
"summary": "SUSE Bug 1094973",
"url": "https://bugzilla.suse.com/1094973"
},
{
"category": "self",
"summary": "SUSE Bug 1096242",
"url": "https://bugzilla.suse.com/1096242"
},
{
"category": "self",
"summary": "SUSE Bug 1096281",
"url": "https://bugzilla.suse.com/1096281"
},
{
"category": "self",
"summary": "SUSE Bug 1099523",
"url": "https://bugzilla.suse.com/1099523"
},
{
"category": "self",
"summary": "SUSE Bug 1100105",
"url": "https://bugzilla.suse.com/1100105"
},
{
"category": "self",
"summary": "SUSE Bug 1101557",
"url": "https://bugzilla.suse.com/1101557"
},
{
"category": "self",
"summary": "SUSE Bug 1102439",
"url": "https://bugzilla.suse.com/1102439"
},
{
"category": "self",
"summary": "SUSE Bug 1102660",
"url": "https://bugzilla.suse.com/1102660"
},
{
"category": "self",
"summary": "SUSE Bug 1103156",
"url": "https://bugzilla.suse.com/1103156"
},
{
"category": "self",
"summary": "SUSE Bug 1103257",
"url": "https://bugzilla.suse.com/1103257"
},
{
"category": "self",
"summary": "SUSE Bug 1103624",
"url": "https://bugzilla.suse.com/1103624"
},
{
"category": "self",
"summary": "SUSE Bug 1104098",
"url": "https://bugzilla.suse.com/1104098"
},
{
"category": "self",
"summary": "SUSE Bug 1104731",
"url": "https://bugzilla.suse.com/1104731"
},
{
"category": "self",
"summary": "SUSE Bug 1105412",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "self",
"summary": "SUSE Bug 1106105",
"url": "https://bugzilla.suse.com/1106105"
},
{
"category": "self",
"summary": "SUSE Bug 1106237",
"url": "https://bugzilla.suse.com/1106237"
},
{
"category": "self",
"summary": "SUSE Bug 1106240",
"url": "https://bugzilla.suse.com/1106240"
},
{
"category": "self",
"summary": "SUSE Bug 1106929",
"url": "https://bugzilla.suse.com/1106929"
},
{
"category": "self",
"summary": "SUSE Bug 1107385",
"url": "https://bugzilla.suse.com/1107385"
},
{
"category": "self",
"summary": "SUSE Bug 1108145",
"url": "https://bugzilla.suse.com/1108145"
},
{
"category": "self",
"summary": "SUSE Bug 1108240",
"url": "https://bugzilla.suse.com/1108240"
},
{
"category": "self",
"summary": "SUSE Bug 1109272",
"url": "https://bugzilla.suse.com/1109272"
},
{
"category": "self",
"summary": "SUSE Bug 1109330",
"url": "https://bugzilla.suse.com/1109330"
},
{
"category": "self",
"summary": "SUSE Bug 1109806",
"url": "https://bugzilla.suse.com/1109806"
},
{
"category": "self",
"summary": "SUSE Bug 1110286",
"url": "https://bugzilla.suse.com/1110286"
},
{
"category": "self",
"summary": "SUSE Bug 1111062",
"url": "https://bugzilla.suse.com/1111062"
},
{
"category": "self",
"summary": "SUSE Bug 1111809",
"url": "https://bugzilla.suse.com/1111809"
},
{
"category": "self",
"summary": "SUSE Bug 1112246",
"url": "https://bugzilla.suse.com/1112246"
},
{
"category": "self",
"summary": "SUSE Bug 1112963",
"url": "https://bugzilla.suse.com/1112963"
},
{
"category": "self",
"summary": "SUSE Bug 1113412",
"url": "https://bugzilla.suse.com/1113412"
},
{
"category": "self",
"summary": "SUSE Bug 1114190",
"url": "https://bugzilla.suse.com/1114190"
},
{
"category": "self",
"summary": "SUSE Bug 1114417",
"url": "https://bugzilla.suse.com/1114417"
},
{
"category": "self",
"summary": "SUSE Bug 1114475",
"url": "https://bugzilla.suse.com/1114475"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1114763",
"url": "https://bugzilla.suse.com/1114763"
},
{
"category": "self",
"summary": "SUSE Bug 1114839",
"url": "https://bugzilla.suse.com/1114839"
},
{
"category": "self",
"summary": "SUSE Bug 1114871",
"url": "https://bugzilla.suse.com/1114871"
},
{
"category": "self",
"summary": "SUSE Bug 1115431",
"url": "https://bugzilla.suse.com/1115431"
},
{
"category": "self",
"summary": "SUSE Bug 1115433",
"url": "https://bugzilla.suse.com/1115433"
},
{
"category": "self",
"summary": "SUSE Bug 1115440",
"url": "https://bugzilla.suse.com/1115440"
},
{
"category": "self",
"summary": "SUSE Bug 1115587",
"url": "https://bugzilla.suse.com/1115587"
},
{
"category": "self",
"summary": "SUSE Bug 1115709",
"url": "https://bugzilla.suse.com/1115709"
},
{
"category": "self",
"summary": "SUSE Bug 1116027",
"url": "https://bugzilla.suse.com/1116027"
},
{
"category": "self",
"summary": "SUSE Bug 1116183",
"url": "https://bugzilla.suse.com/1116183"
},
{
"category": "self",
"summary": "SUSE Bug 1116285",
"url": "https://bugzilla.suse.com/1116285"
},
{
"category": "self",
"summary": "SUSE Bug 1116336",
"url": "https://bugzilla.suse.com/1116336"
},
{
"category": "self",
"summary": "SUSE Bug 1116345",
"url": "https://bugzilla.suse.com/1116345"
},
{
"category": "self",
"summary": "SUSE Bug 1116497",
"url": "https://bugzilla.suse.com/1116497"
},
{
"category": "self",
"summary": "SUSE Bug 1116841",
"url": "https://bugzilla.suse.com/1116841"
},
{
"category": "self",
"summary": "SUSE Bug 1116924",
"url": "https://bugzilla.suse.com/1116924"
},
{
"category": "self",
"summary": "SUSE Bug 1116950",
"url": "https://bugzilla.suse.com/1116950"
},
{
"category": "self",
"summary": "SUSE Bug 1117162",
"url": "https://bugzilla.suse.com/1117162"
},
{
"category": "self",
"summary": "SUSE Bug 1117165",
"url": "https://bugzilla.suse.com/1117165"
},
{
"category": "self",
"summary": "SUSE Bug 1117186",
"url": "https://bugzilla.suse.com/1117186"
},
{
"category": "self",
"summary": "SUSE Bug 1117562",
"url": "https://bugzilla.suse.com/1117562"
},
{
"category": "self",
"summary": "SUSE Bug 1118152",
"url": "https://bugzilla.suse.com/1118152"
},
{
"category": "self",
"summary": "SUSE Bug 1118316",
"url": "https://bugzilla.suse.com/1118316"
},
{
"category": "self",
"summary": "SUSE Bug 1118319",
"url": "https://bugzilla.suse.com/1118319"
},
{
"category": "self",
"summary": "SUSE Bug 1118505",
"url": "https://bugzilla.suse.com/1118505"
},
{
"category": "self",
"summary": "SUSE Bug 1118790",
"url": "https://bugzilla.suse.com/1118790"
},
{
"category": "self",
"summary": "SUSE Bug 1118798",
"url": "https://bugzilla.suse.com/1118798"
},
{
"category": "self",
"summary": "SUSE Bug 1118915",
"url": "https://bugzilla.suse.com/1118915"
},
{
"category": "self",
"summary": "SUSE Bug 1118922",
"url": "https://bugzilla.suse.com/1118922"
},
{
"category": "self",
"summary": "SUSE Bug 1118926",
"url": "https://bugzilla.suse.com/1118926"
},
{
"category": "self",
"summary": "SUSE Bug 1118930",
"url": "https://bugzilla.suse.com/1118930"
},
{
"category": "self",
"summary": "SUSE Bug 1118936",
"url": "https://bugzilla.suse.com/1118936"
},
{
"category": "self",
"summary": "SUSE Bug 1119204",
"url": "https://bugzilla.suse.com/1119204"
},
{
"category": "self",
"summary": "SUSE Bug 1119714",
"url": "https://bugzilla.suse.com/1119714"
},
{
"category": "self",
"summary": "SUSE Bug 1119877",
"url": "https://bugzilla.suse.com/1119877"
},
{
"category": "self",
"summary": "SUSE Bug 1119946",
"url": "https://bugzilla.suse.com/1119946"
},
{
"category": "self",
"summary": "SUSE Bug 1119967",
"url": "https://bugzilla.suse.com/1119967"
},
{
"category": "self",
"summary": "SUSE Bug 1119970",
"url": "https://bugzilla.suse.com/1119970"
},
{
"category": "self",
"summary": "SUSE Bug 1120046",
"url": "https://bugzilla.suse.com/1120046"
},
{
"category": "self",
"summary": "SUSE Bug 1120743",
"url": "https://bugzilla.suse.com/1120743"
},
{
"category": "self",
"summary": "SUSE Bug 1121239",
"url": "https://bugzilla.suse.com/1121239"
},
{
"category": "self",
"summary": "SUSE Bug 1121240",
"url": "https://bugzilla.suse.com/1121240"
},
{
"category": "self",
"summary": "SUSE Bug 1121241",
"url": "https://bugzilla.suse.com/1121241"
},
{
"category": "self",
"summary": "SUSE Bug 1121242",
"url": "https://bugzilla.suse.com/1121242"
},
{
"category": "self",
"summary": "SUSE Bug 1121275",
"url": "https://bugzilla.suse.com/1121275"
},
{
"category": "self",
"summary": "SUSE Bug 1121621",
"url": "https://bugzilla.suse.com/1121621"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16939 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16939/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1120 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16862 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16884 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19407 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19824 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19985 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20169 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9568 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9568/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-01-23T16:57:46Z",
"generator": {
"date": "2019-01-23T16:57:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:0148-1",
"initial_release_date": "2019-01-23T16:57:46Z",
"revision_history": [
{
"date": "2019-01-23T16:57:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.4.170-4.22.1.noarch",
"product": {
"name": "kernel-devel-azure-4.4.170-4.22.1.noarch",
"product_id": "kernel-devel-azure-4.4.170-4.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.4.170-4.22.1.noarch",
"product": {
"name": "kernel-source-azure-4.4.170-4.22.1.noarch",
"product_id": "kernel-source-azure-4.4.170-4.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.4.170-4.22.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.4.170-4.22.1.x86_64",
"product_id": "dlm-kmp-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.4.170-4.22.1.x86_64",
"product_id": "gfs2-kmp-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-azure-4.4.170-4.22.1.x86_64",
"product_id": "kernel-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-azure-base-4.4.170-4.22.1.x86_64",
"product_id": "kernel-azure-base-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.4.170-4.22.1.x86_64",
"product_id": "kernel-azure-devel-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.4.170-4.22.1.x86_64",
"product_id": "kernel-azure-extra-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-4.4.170-4.22.1.x86_64",
"product_id": "kernel-azure-kgraft-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.4.170-4.22.1.x86_64",
"product_id": "kernel-syms-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.4.170-4.22.1.x86_64",
"product_id": "kselftests-kmp-azure-4.4.170-4.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.4.170-4.22.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.4.170-4.22.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.4.170-4.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-base-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.4.170-4.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch"
},
"product_reference": "kernel-devel-azure-4.4.170-4.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.4.170-4.22.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch"
},
"product_reference": "kernel-source-azure-4.4.170-4.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-base-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.4.170-4.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch"
},
"product_reference": "kernel-devel-azure-4.4.170-4.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.4.170-4.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch"
},
"product_reference": "kernel-source-azure-4.4.170-4.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.4.170-4.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.4.170-4.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-16939",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16939"
}
],
"notes": [
{
"category": "general",
"text": "The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16939",
"url": "https://www.suse.com/security/cve/CVE-2017-16939"
},
{
"category": "external",
"summary": "SUSE Bug 1069702 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069702"
},
{
"category": "external",
"summary": "SUSE Bug 1069708 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1069708"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1120260 for CVE-2017-16939",
"url": "https://bugzilla.suse.com/1120260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2017-16939"
},
{
"cve": "CVE-2018-1120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1120"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1120",
"url": "https://www.suse.com/security/cve/CVE-2018-1120"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092100 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1092100"
},
{
"category": "external",
"summary": "SUSE Bug 1093158 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1093158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-1120"
},
{
"cve": "CVE-2018-16862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16862"
}
],
"notes": [
{
"category": "general",
"text": "A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16862",
"url": "https://www.suse.com/security/cve/CVE-2018-16862"
},
{
"category": "external",
"summary": "SUSE Bug 1117186 for CVE-2018-16862",
"url": "https://bugzilla.suse.com/1117186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-16862"
},
{
"cve": "CVE-2018-16884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16884"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16884",
"url": "https://www.suse.com/security/cve/CVE-2018-16884"
},
{
"category": "external",
"summary": "SUSE Bug 1119946 for CVE-2018-16884",
"url": "https://bugzilla.suse.com/1119946"
},
{
"category": "external",
"summary": "SUSE Bug 1119947 for CVE-2018-16884",
"url": "https://bugzilla.suse.com/1119947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "important"
}
],
"title": "CVE-2018-16884"
},
{
"cve": "CVE-2018-19407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19407"
}
],
"notes": [
{
"category": "general",
"text": "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19407",
"url": "https://www.suse.com/security/cve/CVE-2018-19407"
},
{
"category": "external",
"summary": "SUSE Bug 1116841 for CVE-2018-19407",
"url": "https://bugzilla.suse.com/1116841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-19407"
},
{
"cve": "CVE-2018-19824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19824"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19824",
"url": "https://www.suse.com/security/cve/CVE-2018-19824"
},
{
"category": "external",
"summary": "SUSE Bug 1118152 for CVE-2018-19824",
"url": "https://bugzilla.suse.com/1118152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-19824"
},
{
"cve": "CVE-2018-19985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19985"
}
],
"notes": [
{
"category": "general",
"text": "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19985",
"url": "https://www.suse.com/security/cve/CVE-2018-19985"
},
{
"category": "external",
"summary": "SUSE Bug 1120743 for CVE-2018-19985",
"url": "https://bugzilla.suse.com/1120743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "low"
}
],
"title": "CVE-2018-19985"
},
{
"cve": "CVE-2018-20169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20169"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20169",
"url": "https://www.suse.com/security/cve/CVE-2018-20169"
},
{
"category": "external",
"summary": "SUSE Bug 1119714 for CVE-2018-20169",
"url": "https://bugzilla.suse.com/1119714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-20169"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-9568",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9568"
}
],
"notes": [
{
"category": "general",
"text": "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9568",
"url": "https://www.suse.com/security/cve/CVE-2018-9568"
},
{
"category": "external",
"summary": "SUSE Bug 1118319 for CVE-2018-9568",
"url": "https://bugzilla.suse.com/1118319"
},
{
"category": "external",
"summary": "SUSE Bug 1118320 for CVE-2018-9568",
"url": "https://bugzilla.suse.com/1118320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.170-4.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.170-4.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.170-4.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-01-23T16:57:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-9568"
}
]
}
SUSE-SU-2019:0049-2
Vulnerability from csaf_suse - Published: 2019-04-12 18:44 - Updated: 2019-04-12 18:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_7_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_7_0-openjdk to version 7u201 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-3136: Manifest better support (bsc#1112142)\n- CVE-2018-3139: Better HTTP Redirection (bsc#1112143)\n- CVE-2018-3149: Enhance JNDI lookups (bsc#1112144)\n- CVE-2018-3169: Improve field accesses (bsc#1112146)\n- CVE-2018-3180: Improve TLS connections stability (bsc#1112147)\n- CVE-2018-3214: Better RIFF reading support (bsc#1112152)\n- CVE-2018-13785: Upgrade JDK 8u to libpng 1.6.35 (bsc#1112153)\n- CVE-2018-16435: heap-based buffer overflow in SetData function in cmsIT8LoadFromFile\n- CVE-2018-2938: Support Derby connections (bsc#1101644)\n- CVE-2018-2940: Better stack walking (bsc#1101645)\n- CVE-2018-2952: Exception to Pattern Syntax (bsc#1101651)\n- CVE-2018-2973: Improve LDAP support (bsc#1101656)\n- CVE-2018-3639 cpu speculative store bypass mitigation\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-49,SUSE-SLE-SAP-12-SP1-2019-49",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0049-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:0049-2",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:0049-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101644",
"url": "https://bugzilla.suse.com/1101644"
},
{
"category": "self",
"summary": "SUSE Bug 1101645",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "self",
"summary": "SUSE Bug 1101651",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "self",
"summary": "SUSE Bug 1101656",
"url": "https://bugzilla.suse.com/1101656"
},
{
"category": "self",
"summary": "SUSE Bug 1112142",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "self",
"summary": "SUSE Bug 1112143",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "self",
"summary": "SUSE Bug 1112144",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "self",
"summary": "SUSE Bug 1112146",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "self",
"summary": "SUSE Bug 1112147",
"url": "https://bugzilla.suse.com/1112147"
},
{
"category": "self",
"summary": "SUSE Bug 1112152",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "self",
"summary": "SUSE Bug 1112153",
"url": "https://bugzilla.suse.com/1112153"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13785 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16435 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3136 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3139 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3149 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3169 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3180 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3214 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for java-1_7_0-openjdk",
"tracking": {
"current_release_date": "2019-04-12T18:44:10Z",
"generator": {
"date": "2019-04-12T18:44:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:0049-2",
"initial_release_date": "2019-04-12T18:44:10Z",
"revision_history": [
{
"date": "2019-04-12T18:44:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch",
"product": {
"name": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch",
"product_id": "java-1_7_0-openjdk-javadoc-1.7.0.201-43.18.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.201-43.18.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-13785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13785"
}
],
"notes": [
{
"category": "general",
"text": "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13785",
"url": "https://www.suse.com/security/cve/CVE-2018-13785"
},
{
"category": "external",
"summary": "SUSE Bug 1100687 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1100687"
},
{
"category": "external",
"summary": "SUSE Bug 1112153 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1112153"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-13785",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "low"
}
],
"title": "CVE-2018-13785"
},
{
"cve": "CVE-2018-16435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16435"
}
],
"notes": [
{
"category": "general",
"text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16435",
"url": "https://www.suse.com/security/cve/CVE-2018-16435"
},
{
"category": "external",
"summary": "SUSE Bug 1108813 for CVE-2018-16435",
"url": "https://bugzilla.suse.com/1108813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-16435"
},
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "important"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3136"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3136",
"url": "https://www.suse.com/security/cve/CVE-2018-3136"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3136",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3136"
},
{
"cve": "CVE-2018-3139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3139"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3139",
"url": "https://www.suse.com/security/cve/CVE-2018-3139"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3139",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3139"
},
{
"cve": "CVE-2018-3149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3149"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3149",
"url": "https://www.suse.com/security/cve/CVE-2018-3149"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3149",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3149"
},
{
"cve": "CVE-2018-3169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3169"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3169",
"url": "https://www.suse.com/security/cve/CVE-2018-3169"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3169",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3169"
},
{
"cve": "CVE-2018-3180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3180"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3180",
"url": "https://www.suse.com/security/cve/CVE-2018-3180"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112147 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112147"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3180",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3180"
},
{
"cve": "CVE-2018-3214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3214"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3214",
"url": "https://www.suse.com/security/cve/CVE-2018-3214"
},
{
"category": "external",
"summary": "SUSE Bug 1112142 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112142"
},
{
"category": "external",
"summary": "SUSE Bug 1112143 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112143"
},
{
"category": "external",
"summary": "SUSE Bug 1112144 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112144"
},
{
"category": "external",
"summary": "SUSE Bug 1112146 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112146"
},
{
"category": "external",
"summary": "SUSE Bug 1112148 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112148"
},
{
"category": "external",
"summary": "SUSE Bug 1112152 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1112152"
},
{
"category": "external",
"summary": "SUSE Bug 1116574 for CVE-2018-3214",
"url": "https://bugzilla.suse.com/1116574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3214"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.201-43.18.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.201-43.18.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-12T18:44:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1363-1
Vulnerability from csaf_suse - Published: 2018-05-22 08:44 - Updated: 2018-05-22 08:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n- CVE-2017-5715: This update has the next round of Spectre v2 related patches,\n which now integrates with corresponding changes in libvirt. A January 2018\n release of qemu initially addressed the Spectre v2 vulnerability for KVM guests\n by exposing the spec-ctrl feature for all x86 vcpu types. We remove that\n initial patch and now rely on patches from upstream (bsc#1068032).\n\n This update defines spec_ctrl and ibpb cpu feature flags as well as new cpu\n models which are clones of existing models with either -IBRS or -IBPB added to\n the end of the model name. These new vcpu models explicitly include the new\n feature(s), whereas the feature flags can be added to the cpu parameter as with\n other features. In short, for continued Spectre v2 protection, ensure that\n either the appropriate cpu feature flag is added to the QEMU command-line, or\n one of the new cpu models is used. Although migration from older versions is\n supported, the new cpu features won\u0027t be properly exposed to the guest until it\n is restarted with the cpu features explicitly added. A reboot is insufficient.\n- A patch is added to continue to detect Spectre v2 mitigation features (as\n shown by cpuid), and if found provide that feature to guests, even if running\n on older KVM (kernel) versions which do not yet expose that feature to QEMU.\n (bsc#1082276)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-950,SUSE-SLE-SERVER-12-SP1-2018-950",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1363-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1363-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181363-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1363-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-22T08:44:39Z",
"generator": {
"date": "2018-05-22T08:44:39Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1363-1",
"initial_release_date": "2018-05-22T08:44:39Z",
"revision_history": [
{
"date": "2018-05-22T08:44:39Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-33.9.4.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch",
"product_id": "qemu-ipxe-1.0.0-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.8.1-33.9.4.noarch",
"product": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch",
"product_id": "qemu-seabios-1.8.1-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-33.9.4.noarch",
"product": {
"name": "qemu-sgabios-8-33.9.4.noarch",
"product_id": "qemu-sgabios-8-33.9.4.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.8.1-33.9.4.noarch",
"product": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch",
"product_id": "qemu-vgabios-1.8.1-33.9.4.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-block-curl-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-lang-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-ppc-2.3.1-33.9.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.ppc64le",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le",
"product_id": "qemu-tools-2.3.1-33.9.4.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-2.3.1-33.9.4.s390x",
"product_id": "qemu-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.s390x",
"product_id": "qemu-block-curl-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-kvm-2.3.1-33.9.4.s390x",
"product_id": "qemu-kvm-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.s390x",
"product_id": "qemu-lang-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-s390-2.3.1-33.9.4.s390x",
"product_id": "qemu-s390-2.3.1-33.9.4.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.s390x",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.s390x",
"product_id": "qemu-tools-2.3.1-33.9.4.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-2.3.1-33.9.4.x86_64",
"product_id": "qemu-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"product_id": "qemu-block-curl-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"product_id": "qemu-block-rbd-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"product_id": "qemu-guest-agent-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64",
"product_id": "qemu-kvm-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64",
"product_id": "qemu-lang-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64",
"product_id": "qemu-tools-2.3.1-33.9.4.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.3.1-33.9.4.x86_64",
"product": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64",
"product_id": "qemu-x86-2.3.1-33.9.4.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch"
},
"product_reference": "qemu-sgabios-8-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-curl-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-block-rbd-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-guest-agent-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-kvm-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-lang-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-ppc-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-s390-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-seabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch"
},
"product_reference": "qemu-sgabios-8-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-tools-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.8.1-33.9.4.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch"
},
"product_reference": "qemu-vgabios-1.8.1-33.9.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.3.1-33.9.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64"
},
"product_reference": "qemu-x86-2.3.1-33.9.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T08:44:39Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-s390-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:qemu-x86-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-curl-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-block-rbd-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-guest-agent-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ipxe-1.0.0-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-kvm-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-lang-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-ppc-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-seabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-sgabios-8-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-tools-2.3.1-33.9.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-vgabios-1.8.1-33.9.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:qemu-x86-2.3.1-33.9.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T08:44:39Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2019:1219-1
Vulnerability from csaf_suse - Published: 2019-05-13 11:27 - Updated: 2019-05-13 11:27Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Better String parsing (bsc#1132728).\n- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).\n- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).\n- CVE-2019-2422: Better FileChannel (bsc#1122293).\n- CVE-2018-11212: Improve JPEG (bsc#1122299).\n\nNon-Security issue fixed:\n\n- Disable LTO (bsc#1133135).\n- Added Japanese new era name.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1219,SUSE-OpenStack-Cloud-7-2019-1219,SUSE-SLE-DESKTOP-12-SP3-2019-1219,SUSE-SLE-DESKTOP-12-SP4-2019-1219,SUSE-SLE-SAP-12-SP1-2019-1219,SUSE-SLE-SAP-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP1-2019-1219,SUSE-SLE-SERVER-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP2-BCL-2019-1219,SUSE-SLE-SERVER-12-SP3-2019-1219,SUSE-SLE-SERVER-12-SP4-2019-1219,SUSE-Storage-4-2019-1219",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1219-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1219-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191219-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1219-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html"
},
{
"category": "self",
"summary": "SUSE Bug 1122293",
"url": "https://bugzilla.suse.com/1122293"
},
{
"category": "self",
"summary": "SUSE Bug 1122299",
"url": "https://bugzilla.suse.com/1122299"
},
{
"category": "self",
"summary": "SUSE Bug 1132728",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "self",
"summary": "SUSE Bug 1132729",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "self",
"summary": "SUSE Bug 1132732",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "self",
"summary": "SUSE Bug 1133135",
"url": "https://bugzilla.suse.com/1133135"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11212 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2422 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2426 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2602 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2684 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2698 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2698/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2019-05-13T11:27:16Z",
"generator": {
"date": "2019-05-13T11:27:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1219-1",
"initial_release_date": "2019-05-13T11:27:16Z",
"revision_history": [
{
"date": "2019-05-13T11:27:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch",
"product": {
"name": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch",
"product_id": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64",
"product": {
"name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64",
"product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11212",
"url": "https://www.suse.com/security/cve/CVE-2018-11212"
},
{
"category": "external",
"summary": "SUSE Bug 1122299 for CVE-2018-11212",
"url": "https://bugzilla.suse.com/1122299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "low"
}
],
"title": "CVE-2018-11212"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2422"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2422",
"url": "https://www.suse.com/security/cve/CVE-2019-2422"
},
{
"category": "external",
"summary": "SUSE Bug 1122293 for CVE-2019-2422",
"url": "https://bugzilla.suse.com/1122293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-2422"
},
{
"cve": "CVE-2019-2426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2426"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2426",
"url": "https://www.suse.com/security/cve/CVE-2019-2426"
},
{
"category": "external",
"summary": "SUSE Bug 1134297 for CVE-2019-2426",
"url": "https://bugzilla.suse.com/1134297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-2426"
},
{
"cve": "CVE-2019-2602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2602"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2602",
"url": "https://www.suse.com/security/cve/CVE-2019-2602"
},
{
"category": "external",
"summary": "SUSE Bug 1132728 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1132728"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2602",
"url": "https://bugzilla.suse.com/1134718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-2602"
},
{
"cve": "CVE-2019-2684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2684"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2684",
"url": "https://www.suse.com/security/cve/CVE-2019-2684"
},
{
"category": "external",
"summary": "SUSE Bug 1132732 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1132732"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1184734 for CVE-2019-2684",
"url": "https://bugzilla.suse.com/1184734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-2684"
},
{
"cve": "CVE-2019-2698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2698"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2698",
"url": "https://www.suse.com/security/cve/CVE-2019-2698"
},
{
"category": "external",
"summary": "SUSE Bug 1132729 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1132729"
},
{
"category": "external",
"summary": "SUSE Bug 1134718 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1134718"
},
{
"category": "external",
"summary": "SUSE Bug 1163365 for CVE-2019-2698",
"url": "https://bugzilla.suse.com/1163365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-13T11:27:16Z",
"details": "important"
}
],
"title": "CVE-2019-2698"
}
]
}
SUSE-SU-2018:1389-1
Vulnerability from csaf_suse - Published: 2018-05-23 13:29 - Updated: 2018-05-23 13:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kvm fixes the following issues:\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kvm-13621,slessp3-kvm-13621",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1389-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1389-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181389-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1389-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-05-23T13:29:09Z",
"generator": {
"date": "2018-05-23T13:29:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1389-1",
"initial_release_date": "2018-05-23T13:29:09Z",
"revision_history": [
{
"date": "2018-05-23T13:29:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.20.1.i586",
"product": {
"name": "kvm-1.4.2-53.20.1.i586",
"product_id": "kvm-1.4.2-53.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.20.1.s390x",
"product": {
"name": "kvm-1.4.2-53.20.1.s390x",
"product_id": "kvm-1.4.2-53.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-53.20.1.x86_64",
"product": {
"name": "kvm-1.4.2-53.20.1.x86_64",
"product_id": "kvm-1.4.2-53.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.20.1.i586"
},
"product_reference": "kvm-1.4.2-53.20.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.i586"
},
"product_reference": "kvm-1.4.2-53.20.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.s390x"
},
"product_reference": "kvm-1.4.2-53.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.i586"
},
"product_reference": "kvm-1.4.2-53.20.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.s390x"
},
"product_reference": "kvm-1.4.2-53.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-53.20.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.x86_64"
},
"product_reference": "kvm-1.4.2-53.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kvm-1.4.2-53.20.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:kvm-1.4.2-53.20.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-23T13:29:09Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1377-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:48 - Updated: 2018-05-22 11:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bug was fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\nThe following related and non-security bugs were fixed:\n\n- cpuid: Fix cpuid.edx.7.0 propagation to guest\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-956,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-956,SUSE-SLE-HA-12-SP2-2018-956,SUSE-SLE-SAP-12-SP2-2018-956,SUSE-SLE-SERVER-12-SP2-2018-956,SUSE-Storage-4-2018-956",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1377-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1377-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1377-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1092289",
"url": "https://bugzilla.suse.com/1092289"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T11:48:41Z",
"generator": {
"date": "2018-05-22T11:48:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1377-1",
"initial_release_date": "2018-05-22T11:48:41Z",
"revision_history": [
{
"date": "2018-05-22T11:48:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.80.1.noarch",
"product_id": "kernel-devel-4.4.121-92.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.80.1.noarch",
"product_id": "kernel-macros-4.4.121-92.80.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.80.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.80.1.noarch",
"product_id": "kernel-source-4.4.121-92.80.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.80.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.80.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.80.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.80.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.80.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.80.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.80.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.80.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.80.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.80.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.80.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.80.1.s390x",
"product_id": "kernel-default-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.80.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.80.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.80.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.80.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.80.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.80.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.80.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.80.1.s390x",
"product_id": "kernel-syms-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.80.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.80.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.80.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.80.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.80.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.80.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"product_id": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.80.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.80.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.80.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.80.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.80.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.80.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.80.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.80.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.80.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.80.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.80.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.80.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.80.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.80.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.80.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.80.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.80.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.80.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.80.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.80.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.80.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.80.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_80-default-1-3.5.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:48:41Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1376-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:15 - Updated: 2018-05-22 11:15Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n- CVE-2017-5715: The retpoline mitigation for Spectre v2 has been enabled also for 32bit x86.\n- CVE-2017-5753: Spectre v1 mitigations have been improved by the versions\n merged from the upstream kernel.\n\nThe following non-security bugs were fixed:\n\n- Update config files. Set CONFIG_RETPOLINE=y for i386.\n- x86/espfix: Fix return stack in do_double_fault() (bsc#1085279).\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-kernel-20180512-13616,slessp3-kernel-20180512-13616,slexsp3-kernel-20180512-13616",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1376-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1376-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1376-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1085279",
"url": "https://bugzilla.suse.com/1085279"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T11:15:06Z",
"generator": {
"date": "2018-05-22T11:15:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1376-1",
"initial_release_date": "2018-05-22T11:15:06Z",
"revision_history": [
{
"date": "2018-05-22T11:15:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.47.106.29.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-source-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.29.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:15:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:3064-1
Vulnerability from csaf_suse - Published: 2018-10-08 05:42 - Updated: 2018-10-08 05:42Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated\n attacker with network access via multiple protocols to compromise Java SE.\n Successful attacks of this vulnerability can result in takeover of Java SE\n (bsc#1101644).\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1101645)\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1101651)\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1101656)\n\nThese non-security issues were fixed:\n\n- Improve desktop file usage\n- Better Internet address support\n- speculative traps break when classes are redefined\n- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently\n- Clean up code that saves the previous versions of redefined classes\n- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links\n- RedefineClasses() tests fail assert(((Metadata*)obj)-\u003eis_valid()) failed: obj is valid\n- NMT is not enabled if NMT option is specified after class path specifiers\n- EndEntityChecker should not process custom extensions after PKIX validation\n- SupportedDSAParamGen.java failed with timeout\n- Montgomery multiply intrinsic should use correct name\n- When determining the ciphersuite lists, there is no debug output for disabled suites.\n- sun/security/mscapi/SignedObjectChain.java fails on Windows\n- On Windows Swing changes keyboard layout on a window activation\n- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj\n- Even better Internet address support\n- Newlines in JAXB string values of SOAP-requests are escaped to \u0027\u0026#xa;\u0027\n- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException\n- Unable to use JDWP API in JDK 8 to debug JDK 9 VM\n- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3\n- Performance drop with Java JDK 1.8.0_162-b32\n- Upgrade time-zone data to tzdata2018d\n- Fix potential crash in BufImg_SetupICM\n- JDK 8u181 l10n resource file update\n- Remove debug print statements from RMI fix\n- (tz) Upgrade time-zone data to tzdata2018e\n- ObjectInputStream filterCheck method throws NullPointerException\n- adjust reflective access checks\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-2168,SUSE-SLE-DESKTOP-12-SP3-2018-2168,SUSE-SLE-SAP-12-SP2-2018-2168,SUSE-SLE-SERVER-12-SP1-2018-2168,SUSE-SLE-SERVER-12-SP2-2018-2168,SUSE-SLE-SERVER-12-SP3-2018-2168,SUSE-Storage-4-2018-2168",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3064-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3064-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3064-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101644",
"url": "https://bugzilla.suse.com/1101644"
},
{
"category": "self",
"summary": "SUSE Bug 1101645",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "self",
"summary": "SUSE Bug 1101651",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "self",
"summary": "SUSE Bug 1101656",
"url": "https://bugzilla.suse.com/1101656"
},
{
"category": "self",
"summary": "SUSE Bug 1106812",
"url": "https://bugzilla.suse.com/1106812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2018-10-08T05:42:59Z",
"generator": {
"date": "2018-10-08T05:42:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3064-1",
"initial_release_date": "2018-10-08T05:42:59Z",
"revision_history": [
{
"date": "2018-10-08T05:42:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-08T05:42:59Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-08T05:42:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-08T05:42:59Z",
"details": "important"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-08T05:42:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.s390x",
"SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-08T05:42:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:3555-1
Vulnerability from csaf_suse - Published: 2018-10-29 16:28 - Updated: 2018-10-29 16:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS\n (bsc#1098735).\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223).\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n\nThis feature was added:\n\n- Add support for block resize support for disks through the monitor (bsc#1094725).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-2519,SUSE-SLE-SERVER-12-SP3-2018-2519",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3555-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3555-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183555-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3555-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1094725",
"url": "https://bugzilla.suse.com/1094725"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-10-29T16:28:31Z",
"generator": {
"date": "2018-10-29T16:28:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3555-1",
"initial_release_date": "2018-10-29T16:28:31Z",
"revision_history": [
{
"date": "2018-10-29T16:28:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-2.9.1-6.19.11.aarch64",
"product_id": "qemu-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-arm-2.9.1-6.19.11.aarch64",
"product_id": "qemu-arm-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-block-curl-2.9.1-6.19.11.aarch64",
"product_id": "qemu-block-curl-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"product_id": "qemu-block-iscsi-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.19.11.aarch64",
"product_id": "qemu-block-rbd-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.19.11.aarch64",
"product_id": "qemu-block-ssh-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.19.11.aarch64",
"product_id": "qemu-guest-agent-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-lang-2.9.1-6.19.11.aarch64",
"product_id": "qemu-lang-2.9.1-6.19.11.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.19.11.aarch64",
"product": {
"name": "qemu-tools-2.9.1-6.19.11.aarch64",
"product_id": "qemu-tools-2.9.1-6.19.11.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-6.19.11.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-6.19.11.noarch",
"product_id": "qemu-ipxe-1.0.0-6.19.11.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.10.2-6.19.11.noarch",
"product": {
"name": "qemu-seabios-1.10.2-6.19.11.noarch",
"product_id": "qemu-seabios-1.10.2-6.19.11.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-6.19.11.noarch",
"product": {
"name": "qemu-sgabios-8-6.19.11.noarch",
"product_id": "qemu-sgabios-8-6.19.11.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.10.2-6.19.11.noarch",
"product": {
"name": "qemu-vgabios-1.10.2-6.19.11.noarch",
"product_id": "qemu-vgabios-1.10.2-6.19.11.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-block-curl-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-block-curl-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-block-ssh-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-guest-agent-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-lang-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-lang-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-ppc-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-ppc-2.9.1-6.19.11.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.19.11.ppc64le",
"product": {
"name": "qemu-tools-2.9.1-6.19.11.ppc64le",
"product_id": "qemu-tools-2.9.1-6.19.11.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-2.9.1-6.19.11.s390x",
"product_id": "qemu-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-block-curl-2.9.1-6.19.11.s390x",
"product_id": "qemu-block-curl-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.s390x",
"product_id": "qemu-block-iscsi-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-block-ssh-2.9.1-6.19.11.s390x",
"product_id": "qemu-block-ssh-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-guest-agent-2.9.1-6.19.11.s390x",
"product_id": "qemu-guest-agent-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-kvm-2.9.1-6.19.11.s390x",
"product_id": "qemu-kvm-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-lang-2.9.1-6.19.11.s390x",
"product_id": "qemu-lang-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-s390-2.9.1-6.19.11.s390x",
"product_id": "qemu-s390-2.9.1-6.19.11.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.19.11.s390x",
"product": {
"name": "qemu-tools-2.9.1-6.19.11.s390x",
"product_id": "qemu-tools-2.9.1-6.19.11.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-2.9.1-6.19.11.x86_64",
"product_id": "qemu-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-block-curl-2.9.1-6.19.11.x86_64",
"product_id": "qemu-block-curl-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-kvm-2.9.1-6.19.11.x86_64",
"product_id": "qemu-kvm-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-tools-2.9.1-6.19.11.x86_64",
"product_id": "qemu-tools-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-x86-2.9.1-6.19.11.x86_64",
"product_id": "qemu-x86-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"product_id": "qemu-block-iscsi-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-block-rbd-2.9.1-6.19.11.x86_64",
"product_id": "qemu-block-rbd-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-block-ssh-2.9.1-6.19.11.x86_64",
"product_id": "qemu-block-ssh-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-guest-agent-2.9.1-6.19.11.x86_64",
"product_id": "qemu-guest-agent-2.9.1-6.19.11.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.9.1-6.19.11.x86_64",
"product": {
"name": "qemu-lang-2.9.1-6.19.11.x86_64",
"product_id": "qemu-lang-2.9.1-6.19.11.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.19.11.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.19.11.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch"
},
"product_reference": "qemu-sgabios-8-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.19.11.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.19.11.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch"
},
"product_reference": "qemu-sgabios-8-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-arm-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-curl-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-rbd-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-block-ssh-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-guest-agent-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-6.19.11.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-kvm-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-kvm-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-lang-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-ppc-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-s390-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-seabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-6.19.11.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch"
},
"product_reference": "qemu-sgabios-8-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-tools-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.10.2-6.19.11.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch"
},
"product_reference": "qemu-vgabios-1.10.2-6.19.11.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.9.1-6.19.11.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
},
"product_reference": "qemu-x86-2.9.1-6.19.11.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-29T16:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-29T16:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-arm-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-curl-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-iscsi-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-rbd-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-block-ssh-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-guest-agent-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ipxe-1.0.0-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-kvm-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-lang-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-ppc-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-s390-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-seabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-sgabios-8-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-tools-2.9.1-6.19.11.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-vgabios-1.10.2-6.19.11.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:qemu-x86-2.9.1-6.19.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-29T16:28:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2076-1
Vulnerability from csaf_suse - Published: 2018-07-26 14:39 - Updated: 2018-07-26 14:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for microcode_ctl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n \nThis update for microcode_ctl fixes the following issues:\n\nThe Intel CPU Microcode bundle was updated to the 20180703 release\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and\nhelps mitigating CVE-2018-3639 (Spectre v4) (bsc#1100147 bsc#1087082 bsc#1087083)\n\nMore details can be found on:\n\n https://downloadcenter.intel.com/download/27945/Linux-Processor-Microcode-Data-File\n\nFollowing chipsets are fixed in this round:\n\nModel Stepping F-MO-S/PI Old-\u003eNew\n---- updated platforms ------------------------------------\nSNB-EP C1 6-2d-6/6d 0000061c-\u003e0000061d Xeon E5\nSNB-EP C2 6-2d-7/6d 00000713-\u003e00000714 Xeon E5\nIVT C0 6-3e-4/ed 0000042c-\u003e0000042d Xeon E5 v2; Core i7-4960X/4930K/4820K\nIVT D1 6-3e-7/ed 00000713-\u003e00000714 Xeon E5 v2\nHSX-E/EP/4S C0 6-3f-2/6f 0000003c-\u003e0000003d Xeon E5 v3\nHSX-EX E0 6-3f-4/80 00000011-\u003e00000012 Xeon E7 v3\nSKX-SP/D/W/X H0 6-55-4/b7 02000043-\u003e0200004d Xeon Bronze 31xx, Silver 41xx, Gold 51xx/61xx Platinum 81xx, D/W-21xx; Core i9-7xxxX\nBDX-DE A1 6-56-5/10 0e000009-\u003e0e00000a Xeon D-15x3N\nBDX-ML B/M/R0 6-4f-1/ef 0b00002c-\u003e0b00002e Xeon E5/E7 v4; Core i7-69xx/68xx\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-microcode_ctl-13704,slessp3-microcode_ctl-13704,slessp4-microcode_ctl-13704",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2076-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2076-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182076-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2076-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1100147",
"url": "https://bugzilla.suse.com/1100147"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
}
],
"title": "Security update for microcode_ctl",
"tracking": {
"current_release_date": "2018-07-26T14:39:31Z",
"generator": {
"date": "2018-07-26T14:39:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2076-1",
"initial_release_date": "2018-07-26T14:39:31Z",
"revision_history": [
{
"date": "2018-07-26T14:39:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.24.1.i586",
"product": {
"name": "microcode_ctl-1.17-102.83.24.1.i586",
"product_id": "microcode_ctl-1.17-102.83.24.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.24.1.x86_64",
"product": {
"name": "microcode_ctl-1.17-102.83.24.1.x86_64",
"product_id": "microcode_ctl-1.17-102.83.24.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.24.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.24.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:39:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.24.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:39:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
}
]
}
SUSE-SU-2018:1582-1
Vulnerability from csaf_suse - Published: 2018-06-07 13:35 - Updated: 2018-06-07 13:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes one issue.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting\n information via a side-channel analysis, aka Speculative Store Bypass (SSB),\n Variant 4 (bsc#1092631).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-SP1-2018-1094,SUSE-SLE-SERVER-12-SP1-2018-1094",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1582-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1582-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181582-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1582-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-07T13:35:33Z",
"generator": {
"date": "2018-06-07T13:35:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1582-1",
"initial_release_date": "2018-06-07T13:35:33Z",
"revision_history": [
{
"date": "2018-06-07T13:35:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-4.5.5_24-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-doc-html-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-doc-html-4.5.5_24-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"product": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"product_id": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-libs-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-libs-4.5.5_24-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-tools-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-tools-4.5.5_24-22.49.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"product": {
"name": "xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"product_id": "xen-tools-domU-4.5.5_24-22.49.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_24-22.49.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.49.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.49.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.49.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_24_k3.12.74_60.64.93-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_24-22.49.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_24-22.49.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-07T13:35:33Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2973-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:49 - Updated: 2018-10-18 12:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following security issues:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS (bsc#1098735)\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-2116",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2973-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2973-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182973-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2973-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-10-18T12:49:31Z",
"generator": {
"date": "2018-10-18T12:49:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2973-2",
"initial_release_date": "2018-10-18T12:49:31Z",
"revision_history": [
{
"date": "2018-10-18T12:49:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.43.3.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch",
"product_id": "qemu-ipxe-1.0.0-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.43.3.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch",
"product_id": "qemu-seabios-1.9.1-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.43.3.noarch",
"product": {
"name": "qemu-sgabios-8-41.43.3.noarch",
"product_id": "qemu-sgabios-8-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.43.3.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch",
"product_id": "qemu-vgabios-1.9.1-41.43.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-2.6.2-41.43.3.x86_64",
"product_id": "qemu-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64",
"product_id": "qemu-kvm-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64",
"product_id": "qemu-lang-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64",
"product_id": "qemu-tools-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64",
"product_id": "qemu-x86-2.6.2-41.43.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:31Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1479-1
Vulnerability from csaf_suse - Published: 2018-05-30 14:54 - Updated: 2018-05-30 14:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kvm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kvm fixes one security issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n \n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n \n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n \n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n \n spec-ctrl and ssbd support is also required in the host.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kvm-13634",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1479-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1479-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181479-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1479-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for kvm",
"tracking": {
"current_release_date": "2018-05-30T14:54:22Z",
"generator": {
"date": "2018-05-30T14:54:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1479-1",
"initial_release_date": "2018-05-30T14:54:22Z",
"revision_history": [
{
"date": "2018-05-30T14:54:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.12.1.i586",
"product": {
"name": "kvm-1.4.2-60.12.1.i586",
"product_id": "kvm-1.4.2-60.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.12.1.s390x",
"product": {
"name": "kvm-1.4.2-60.12.1.s390x",
"product_id": "kvm-1.4.2-60.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kvm-1.4.2-60.12.1.x86_64",
"product": {
"name": "kvm-1.4.2-60.12.1.x86_64",
"product_id": "kvm-1.4.2-60.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.i586"
},
"product_reference": "kvm-1.4.2-60.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.s390x"
},
"product_reference": "kvm-1.4.2-60.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.i586"
},
"product_reference": "kvm-1.4.2-60.12.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.s390x"
},
"product_reference": "kvm-1.4.2-60.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kvm-1.4.2-60.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.x86_64"
},
"product_reference": "kvm-1.4.2-60.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kvm-1.4.2-60.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kvm-1.4.2-60.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-30T14:54:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2023:3349-1
Vulnerability from csaf_suse - Published: 2023-08-17 12:48 - Updated: 2023-08-17 12:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-3609: Fixed reference counter leak leading to overflow in net/sched (bsc#1213586).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2022-40982: Fixed transient execution attack called \u0027Gather Data Sampling\u0027 (bsc#1206418).\n- CVE-2023-20593: Fixed a ZenBleed issue in \u0027Zen 2\u0027 CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).\n- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).\n- CVE-2023-20569: Fixed side channel attack \u2018Inception\u2019 or \u2018RAS Poisoning\u2019 (bsc#1213287).\n \nThe following non-security bugs were fixed:\n\n- Get module prefix from kmod (bsc#1212835).\n- USB: add NO_LPM quirk for Realforce 87U Keyboard (git-fixes).\n- USB: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).\n- USB: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).\n- USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- USB: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- USB: serial: option: add Fibocom FM160 0x0111 composition (git-fixes).\n- USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes).\n- USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes).\n- USB: serial: option: add Sierra Wireless EM9191 (git-fixes).\n- USB: serial: option: add u-blox LARA-R6 00B modem (git-fixes).\n- blkcg, writeback: dead memcgs shouldn\u0027t contribute to writeback ownership arbitration (bsc#1213022).\n- btrfs: fix resolving backrefs for inline extent followed by prealloc (bsc#1213133).\n- delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.\n- dlm: Delete an unnecessary variable initialisation in dlm_ls_start() (git-fixes).\n- dlm: NULL check before kmem_cache_destroy is not needed (git-fixes).\n- dlm: fix invalid cluster name warning (git-fixes).\n- dlm: fix missing idr_destroy for recover_idr (git-fixes).\n- dlm: fix missing lkb refcount handling (git-fixes).\n- dlm: fix plock invalid read (git-fixes).\n- dlm: fix possible call to kfree() for non-initialized pointer (git-fixes).\n- ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).\n- ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).\n- ext4: avoid BUG_ON when creating xattrs (bsc#1205496).\n- ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).\n- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).\n- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).\n- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).\n- ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).\n- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).\n- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).\n- ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).\n- ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).\n- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).\n- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).\n- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).\n- ext4: init quota for \u0027old.inode\u0027 in \u0027ext4_rename\u0027 (bsc#1207629).\n- ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).\n- ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).\n- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).\n- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).\n- fs: dlm: cancel work sync othercon (git-fixes).\n- fs: dlm: filter user dlm messages for kernel locks (git-fixes).\n- fs: dlm: fix configfs memory leak (git-fixes).\n- fs: dlm: fix debugfs dump (git-fixes).\n- fs: dlm: fix memory leak when fenced (git-fixes).\n- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).\n- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).\n- fs: fix guard_bio_eod to check for real EOD errors (bsc#1213042).\n- fs: prevent BUG_ON in submit_bh_wbc() (bsc#1212990).\n- fuse: revalidate: do not invalidate if interrupted (bsc#1213525).\n- igb: revert rtnl_lock() that causes deadlock (git-fixes).\n- include/trace/events/writeback.h: fix -Wstringop-truncation warnings (bsc#1213023).\n- inotify: Avoid reporting event with invalid wd (bsc#1213025).\n- jbd2: Fix statistics for the number of logged blocks (bsc#1212988).\n- jbd2: abort journal if free a async write error metadata buffer (bsc#1212989).\n- jbd2: fix assertion \u0027jh-\u003eb_frozen_data == NULL\u0027 failure when journal aborted (bsc#1202716).\n- jbd2: fix data races at struct journal_head (bsc#1173438).\n- jbd2: fix invalid descriptor block checksum (bsc#1212987).\n- jbd2: fix race when writing superblock (bsc#1212986).\n- jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).\n- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.\n- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).\n- lib/string: Add strscpy_pad() function (bsc#1213023).\n- mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).\n- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).\n- memcg: fix a crash in wb_workfn when a device disappears (bsc#1213023).\n- net: mana: Add support for vlan tagging (bsc#1212301).\n- ocfs2: check new file size on fallocate call (git-fixes).\n- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).\n- powerpc/64: update speculation_store_bypass in /proc/\u0026lt;pid\u003e/status (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).\n- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.\n- s390/cio: check the subchannel validity for dev_busid (bsc#1207526).\n- s390/cpum_sf: adjust sampling interval to avoid hitting sample limits (git-fixes bsc#1213827).\n- s390/dasd: fix memleak in path handling error case (git-fixes bsc#1213221).\n- s390/maccess: add no dat mode to kernel_write (git-fixes bsc#1213825).\n- s390/numa: move initial setup of node_to_cpumask_map (git-fixes bsc#1213766).\n- s390/perf: Change CPUM_CF return code in event init function (git-fixes bsc#1213344).\n- s390/perf: Return error when debug_register fails (git-fixes bsc#1212657).\n- s390: limit brk randomization to 32MB (git-fixes bsc#1213346).\n- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).\n- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).\n- uas: ignore UAS for Thinkplus chips (git-fixes).\n- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).\n- ubi: ensure that VID header offset + VID header size \u0026lt;= alloc, size (bsc#1210584).\n- udf: Avoid double brelse() in udf_rename() (bsc#1213032).\n- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).\n- udf: Define EFSCORRUPTED error code (bsc#1213038).\n- udf: Discard preallocation before extending file with a hole (bsc#1213036).\n- udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).\n- udf: Do not bother merging very long extents (bsc#1213040).\n- udf: Do not update file length for failed writes to inline files (bsc#1213041).\n- udf: Drop unused arguments of udf_delete_aext() (bsc#1213033).\n- udf: Fix extending file within last block (bsc#1213037).\n- udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).\n- udf: Truncate added extents on failed expansion (bsc#1213039).\n- update suse/s390-dasd-fix-no-record-found-for-raw_track_access (git-fixes bsc#1212266 bsc#1207528).\n- update suse/scsi-zfcp-fix-missing-auto-port-scan-and-thus-missing-target-ports (git-fixes bsc#1202670).\n- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).\n- usrmerge: Adjust module path in the kernel sources (bsc#1212835).\n- vfio-ccw: Do not call flush_workqueue while holding the spinlock (git-fixes bsc#1213218).\n- vfio-ccw: fence off transport mode (git-fixes bsc#1213215).\n- vfio-ccw: prevent quiesce function going into an infinite loop (git-fixes bsc#1213819).\n- vfio-ccw: release any channel program when releasing/removing vfio-ccw mdev (git-fixes bsc#1213823).\n- writeback: fix call of incorrect macro (bsc#1213024).\n- x86/bugs: Enable STIBP for JMP2RET (git-fixes).\n- x86/bugs: Remove apostrophe typo (git-fixes).\n- x86/bugs: Warn when \u0027ibrs\u0027 mitigation is selected on Enhanced IBRS parts (git-fixes).\n- x86/cpu: Load microcode during restore_processor_state() (git-fixes).\n- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).\n- x86/speculation/mmio: Print SMT warning (git-fixes).\n- x86: Fix return value of __setup handlers (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3349,SUSE-SLE-SERVER-12-SP5-2023-3349",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3349-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3349-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233349-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3349-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1150305",
"url": "https://bugzilla.suse.com/1150305"
},
{
"category": "self",
"summary": "SUSE Bug 1173438",
"url": "https://bugzilla.suse.com/1173438"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1202670",
"url": "https://bugzilla.suse.com/1202670"
},
{
"category": "self",
"summary": "SUSE Bug 1202716",
"url": "https://bugzilla.suse.com/1202716"
},
{
"category": "self",
"summary": "SUSE Bug 1205496",
"url": "https://bugzilla.suse.com/1205496"
},
{
"category": "self",
"summary": "SUSE Bug 1206418",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "self",
"summary": "SUSE Bug 1207526",
"url": "https://bugzilla.suse.com/1207526"
},
{
"category": "self",
"summary": "SUSE Bug 1207528",
"url": "https://bugzilla.suse.com/1207528"
},
{
"category": "self",
"summary": "SUSE Bug 1207561",
"url": "https://bugzilla.suse.com/1207561"
},
{
"category": "self",
"summary": "SUSE Bug 1207617",
"url": "https://bugzilla.suse.com/1207617"
},
{
"category": "self",
"summary": "SUSE Bug 1207620",
"url": "https://bugzilla.suse.com/1207620"
},
{
"category": "self",
"summary": "SUSE Bug 1207629",
"url": "https://bugzilla.suse.com/1207629"
},
{
"category": "self",
"summary": "SUSE Bug 1207630",
"url": "https://bugzilla.suse.com/1207630"
},
{
"category": "self",
"summary": "SUSE Bug 1207633",
"url": "https://bugzilla.suse.com/1207633"
},
{
"category": "self",
"summary": "SUSE Bug 1207634",
"url": "https://bugzilla.suse.com/1207634"
},
{
"category": "self",
"summary": "SUSE Bug 1207653",
"url": "https://bugzilla.suse.com/1207653"
},
{
"category": "self",
"summary": "SUSE Bug 1208788",
"url": "https://bugzilla.suse.com/1208788"
},
{
"category": "self",
"summary": "SUSE Bug 1210584",
"url": "https://bugzilla.suse.com/1210584"
},
{
"category": "self",
"summary": "SUSE Bug 1210765",
"url": "https://bugzilla.suse.com/1210765"
},
{
"category": "self",
"summary": "SUSE Bug 1210766",
"url": "https://bugzilla.suse.com/1210766"
},
{
"category": "self",
"summary": "SUSE Bug 1210771",
"url": "https://bugzilla.suse.com/1210771"
},
{
"category": "self",
"summary": "SUSE Bug 1211738",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "self",
"summary": "SUSE Bug 1211867",
"url": "https://bugzilla.suse.com/1211867"
},
{
"category": "self",
"summary": "SUSE Bug 1212266",
"url": "https://bugzilla.suse.com/1212266"
},
{
"category": "self",
"summary": "SUSE Bug 1212301",
"url": "https://bugzilla.suse.com/1212301"
},
{
"category": "self",
"summary": "SUSE Bug 1212657",
"url": "https://bugzilla.suse.com/1212657"
},
{
"category": "self",
"summary": "SUSE Bug 1212741",
"url": "https://bugzilla.suse.com/1212741"
},
{
"category": "self",
"summary": "SUSE Bug 1212835",
"url": "https://bugzilla.suse.com/1212835"
},
{
"category": "self",
"summary": "SUSE Bug 1212871",
"url": "https://bugzilla.suse.com/1212871"
},
{
"category": "self",
"summary": "SUSE Bug 1212905",
"url": "https://bugzilla.suse.com/1212905"
},
{
"category": "self",
"summary": "SUSE Bug 1212986",
"url": "https://bugzilla.suse.com/1212986"
},
{
"category": "self",
"summary": "SUSE Bug 1212987",
"url": "https://bugzilla.suse.com/1212987"
},
{
"category": "self",
"summary": "SUSE Bug 1212988",
"url": "https://bugzilla.suse.com/1212988"
},
{
"category": "self",
"summary": "SUSE Bug 1212989",
"url": "https://bugzilla.suse.com/1212989"
},
{
"category": "self",
"summary": "SUSE Bug 1212990",
"url": "https://bugzilla.suse.com/1212990"
},
{
"category": "self",
"summary": "SUSE Bug 1213010",
"url": "https://bugzilla.suse.com/1213010"
},
{
"category": "self",
"summary": "SUSE Bug 1213011",
"url": "https://bugzilla.suse.com/1213011"
},
{
"category": "self",
"summary": "SUSE Bug 1213012",
"url": "https://bugzilla.suse.com/1213012"
},
{
"category": "self",
"summary": "SUSE Bug 1213013",
"url": "https://bugzilla.suse.com/1213013"
},
{
"category": "self",
"summary": "SUSE Bug 1213014",
"url": "https://bugzilla.suse.com/1213014"
},
{
"category": "self",
"summary": "SUSE Bug 1213015",
"url": "https://bugzilla.suse.com/1213015"
},
{
"category": "self",
"summary": "SUSE Bug 1213017",
"url": "https://bugzilla.suse.com/1213017"
},
{
"category": "self",
"summary": "SUSE Bug 1213018",
"url": "https://bugzilla.suse.com/1213018"
},
{
"category": "self",
"summary": "SUSE Bug 1213019",
"url": "https://bugzilla.suse.com/1213019"
},
{
"category": "self",
"summary": "SUSE Bug 1213020",
"url": "https://bugzilla.suse.com/1213020"
},
{
"category": "self",
"summary": "SUSE Bug 1213021",
"url": "https://bugzilla.suse.com/1213021"
},
{
"category": "self",
"summary": "SUSE Bug 1213022",
"url": "https://bugzilla.suse.com/1213022"
},
{
"category": "self",
"summary": "SUSE Bug 1213023",
"url": "https://bugzilla.suse.com/1213023"
},
{
"category": "self",
"summary": "SUSE Bug 1213024",
"url": "https://bugzilla.suse.com/1213024"
},
{
"category": "self",
"summary": "SUSE Bug 1213025",
"url": "https://bugzilla.suse.com/1213025"
},
{
"category": "self",
"summary": "SUSE Bug 1213032",
"url": "https://bugzilla.suse.com/1213032"
},
{
"category": "self",
"summary": "SUSE Bug 1213033",
"url": "https://bugzilla.suse.com/1213033"
},
{
"category": "self",
"summary": "SUSE Bug 1213034",
"url": "https://bugzilla.suse.com/1213034"
},
{
"category": "self",
"summary": "SUSE Bug 1213035",
"url": "https://bugzilla.suse.com/1213035"
},
{
"category": "self",
"summary": "SUSE Bug 1213036",
"url": "https://bugzilla.suse.com/1213036"
},
{
"category": "self",
"summary": "SUSE Bug 1213037",
"url": "https://bugzilla.suse.com/1213037"
},
{
"category": "self",
"summary": "SUSE Bug 1213038",
"url": "https://bugzilla.suse.com/1213038"
},
{
"category": "self",
"summary": "SUSE Bug 1213039",
"url": "https://bugzilla.suse.com/1213039"
},
{
"category": "self",
"summary": "SUSE Bug 1213040",
"url": "https://bugzilla.suse.com/1213040"
},
{
"category": "self",
"summary": "SUSE Bug 1213041",
"url": "https://bugzilla.suse.com/1213041"
},
{
"category": "self",
"summary": "SUSE Bug 1213042",
"url": "https://bugzilla.suse.com/1213042"
},
{
"category": "self",
"summary": "SUSE Bug 1213059",
"url": "https://bugzilla.suse.com/1213059"
},
{
"category": "self",
"summary": "SUSE Bug 1213133",
"url": "https://bugzilla.suse.com/1213133"
},
{
"category": "self",
"summary": "SUSE Bug 1213167",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "self",
"summary": "SUSE Bug 1213215",
"url": "https://bugzilla.suse.com/1213215"
},
{
"category": "self",
"summary": "SUSE Bug 1213218",
"url": "https://bugzilla.suse.com/1213218"
},
{
"category": "self",
"summary": "SUSE Bug 1213221",
"url": "https://bugzilla.suse.com/1213221"
},
{
"category": "self",
"summary": "SUSE Bug 1213286",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "self",
"summary": "SUSE Bug 1213287",
"url": "https://bugzilla.suse.com/1213287"
},
{
"category": "self",
"summary": "SUSE Bug 1213344",
"url": "https://bugzilla.suse.com/1213344"
},
{
"category": "self",
"summary": "SUSE Bug 1213346",
"url": "https://bugzilla.suse.com/1213346"
},
{
"category": "self",
"summary": "SUSE Bug 1213350",
"url": "https://bugzilla.suse.com/1213350"
},
{
"category": "self",
"summary": "SUSE Bug 1213525",
"url": "https://bugzilla.suse.com/1213525"
},
{
"category": "self",
"summary": "SUSE Bug 1213585",
"url": "https://bugzilla.suse.com/1213585"
},
{
"category": "self",
"summary": "SUSE Bug 1213586",
"url": "https://bugzilla.suse.com/1213586"
},
{
"category": "self",
"summary": "SUSE Bug 1213588",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "self",
"summary": "SUSE Bug 1213705",
"url": "https://bugzilla.suse.com/1213705"
},
{
"category": "self",
"summary": "SUSE Bug 1213747",
"url": "https://bugzilla.suse.com/1213747"
},
{
"category": "self",
"summary": "SUSE Bug 1213766",
"url": "https://bugzilla.suse.com/1213766"
},
{
"category": "self",
"summary": "SUSE Bug 1213819",
"url": "https://bugzilla.suse.com/1213819"
},
{
"category": "self",
"summary": "SUSE Bug 1213823",
"url": "https://bugzilla.suse.com/1213823"
},
{
"category": "self",
"summary": "SUSE Bug 1213825",
"url": "https://bugzilla.suse.com/1213825"
},
{
"category": "self",
"summary": "SUSE Bug 1213827",
"url": "https://bugzilla.suse.com/1213827"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0459 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2985 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-35001 page",
"url": "https://www.suse.com/security/cve/CVE-2023-35001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3776 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3776/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-08-17T12:48:19Z",
"generator": {
"date": "2023-08-17T12:48:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3349-1",
"initial_release_date": "2023-08-17T12:48:19Z",
"revision_history": [
{
"date": "2023-08-17T12:48:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.146.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.146.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.146.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.146.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.146.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.146.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.146.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.146.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.146.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.146.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.146.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.146.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.146.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.146.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.146.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.146.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.146.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.146.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.146.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.146.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.146.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.146.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.146.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.146.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.146.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.146.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.146.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.146.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.146.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.146.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2023-0459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0459"
}
],
"notes": [
{
"category": "general",
"text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0459",
"url": "https://www.suse.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "SUSE Bug 1211738 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-0459"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2985"
}
],
"notes": [
{
"category": "general",
"text": "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2985",
"url": "https://www.suse.com/security/cve/CVE-2023-2985"
},
{
"category": "external",
"summary": "SUSE Bug 1211867 for CVE-2023-2985",
"url": "https://bugzilla.suse.com/1211867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-2985"
},
{
"cve": "CVE-2023-35001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-35001"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-35001",
"url": "https://www.suse.com/security/cve/CVE-2023-35001"
},
{
"category": "external",
"summary": "SUSE Bug 1213059 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1213059"
},
{
"category": "external",
"summary": "SUSE Bug 1213063 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1213063"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "important"
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3567"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3567",
"url": "https://www.suse.com/security/cve/CVE-2023-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1213167 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "external",
"summary": "SUSE Bug 1213244 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213244"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "important"
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3609"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3609",
"url": "https://www.suse.com/security/cve/CVE-2023-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1213586 for CVE-2023-3609",
"url": "https://bugzilla.suse.com/1213586"
},
{
"category": "external",
"summary": "SUSE Bug 1213587 for CVE-2023-3609",
"url": "https://bugzilla.suse.com/1213587"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3609",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3609",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "important"
}
],
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3611"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3611",
"url": "https://www.suse.com/security/cve/CVE-2023-3611"
},
{
"category": "external",
"summary": "SUSE Bug 1213585 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1213585"
},
{
"category": "external",
"summary": "SUSE Bug 1223091 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1223091"
},
{
"category": "external",
"summary": "SUSE Bug 1223973 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1223973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "moderate"
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3776"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3776",
"url": "https://www.suse.com/security/cve/CVE-2023-3776"
},
{
"category": "external",
"summary": "SUSE Bug 1213588 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "external",
"summary": "SUSE Bug 1215119 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215119"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223091 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223091"
},
{
"category": "external",
"summary": "SUSE Bug 1223973 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.146.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.146.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.146.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-17T12:48:19Z",
"details": "important"
}
],
"title": "CVE-2023-3776"
}
]
}
SUSE-SU-2018:1846-1
Vulnerability from csaf_suse - Published: 2018-06-29 09:36 - Updated: 2018-06-29 09:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThis new feature was added:\n\n- Btrfs: Remove empty block groups in the background\n\nThe following security bugs were fixed:\n\n- : Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- : Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082)\n- : Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895)\n- : The do_get_mempolicy function allowed local users to cause a\n denial of service (use-after-free) or possibly have unspecified other impact\n via crafted system calls (bnc#1091755).\n\nThe following non-security bugs were fixed:\n\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- Avoid quadratic search when freeing delegations (bsc#1084760).\n- Btrfs: Avoid trucating page or punching hole in a already existed hole (bsc#1088998).\n- Btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1094424).\n- Btrfs: Fix lost-data-profile caused by auto removing bg\n- Btrfs: Fix misuse of chunk mutex\n- Btrfs: Fix out-of-space bug (bsc#1089231).\n- Btrfs: Set relative data on clear btrfs_block_group_cache-\u003epinned\n- Btrfs: Use ref_cnt for set_block_group_ro() (bsc#1089239).\n- Btrfs: add alloc_fs_devices and switch to it (bsc#1089205).\n- Btrfs: add btrfs_alloc_device and switch to it (bsc#1089204).\n- Btrfs: add missing discards when unpinning extents with -o discard\n- Btrfs: add missing inode update when punching hole (bsc#1089006).\n- Btrfs: add support for asserts (bsc#1089207).\n- Btrfs: avoid syncing log in the fast fsync path when not necessary (bsc#1089010).\n- Btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries\n- Btrfs: check pending chunks when shrinking fs to avoid corruption (bsc#1089235).\n- Btrfs: cleanup backref search commit root flag stuff (bsc#1089200).\n- Btrfs: do not leak transaction in btrfs_sync_file() (bsc#1089210).\n- Btrfs: do not mix the ordered extents of all files together during logging the inodes (bsc#1089214).\n- Btrfs: do not remove extents and xattrs when logging new names (bsc#1089005).\n- Btrfs: eliminate races in worker stopping code (bsc#1089211).\n- Btrfs: ensure deletion from pinned_chunks list is protected\n- Btrfs: fix -ENOSPC on block group removal\n- Btrfs: fix -ENOSPC when finishing block group creation\n- Btrfs: fix NULL pointer crash when running balance and scrub concurrently (bsc#1089220).\n- Btrfs: fix chunk allocation regression leading to transaction abort (bsc#1089236).\n- Btrfs: fix crash caused by block group removal\n- Btrfs: fix data loss in the fast fsync path (bsc#1089007).\n- Btrfs: fix deadlock caused by fsync when logging directory entries (bsc#1093194).\n- Btrfs: fix directory inconsistency after fsync log replay (bsc#1089001).\n- Btrfs: fix directory recovery from fsync log (bsc#1088999).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#1093195).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#1093196).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#1089241).\n- Btrfs: fix find_free_dev_extent() malfunction in case device tree has hole (bsc#1089232).\n- Btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use\n- Btrfs: fix freeing used extent after removing empty block group\n- Btrfs: fix freeing used extents after removing empty block group\n- Btrfs: fix fs mapping extent map leak (bsc#1089229).\n- Btrfs: fix fsync data loss after a ranged fsync (bsc#1089221).\n- Btrfs: fix fsync data loss after adding hard link to inode (bsc#1089004).\n- Btrfs: fix fsync data loss after append write (bsc#1089238).\n- Btrfs: fix fsync log replay for inodes with a mix of regular refs and extrefs (bsc#1089003).\n- Btrfs: fix fsync race leading to invalid data after log replay (bsc#1089000).\n- Btrfs: fix fsync when extend references are added to an inode (bsc#1089002).\n- Btrfs: fix fsync xattr loss in the fast fsync path (bsc#1094423).\n- Btrfs: fix invalid extent maps due to hole punching (bsc#1094425).\n- Btrfs: fix kernel oops while reading compressed data (bsc#1089192).\n- Btrfs: fix log replay failure after linking special file and fsync (bsc#1089016).\n- Btrfs: fix memory leak after block remove + trimming\n- Btrfs: fix metadata inconsistencies after directory fsync (bsc#1093197).\n- Btrfs: fix race between balance and unused block group deletion (bsc#1089237).\n- Btrfs: fix race between fs trimming and block group remove/allocation\n- Btrfs: fix race between scrub and block group deletion\n- Btrfs: fix race between transaction commit and empty block group removal \n- Btrfs: fix race conditions in BTRFS_IOC_FS_INFO ioctl (bsc#1089206).\n- Btrfs: fix racy system chunk allocation when setting block group ro (bsc#1089233).\n- Btrfs: fix regression in raid level conversion (bsc#1089234).\n- Btrfs: fix skipped error handle when log sync failed (bsc#1089217).\n- Btrfs: fix stale dir entries after removing a link and fsync (bsc#1089011).\n- Btrfs: fix the number of transaction units needed to remove a block group\n- Btrfs: fix the skipped transaction commit during the file sync (bsc#1089216).\n- Btrfs: fix uninitialized variable warning in __extent_writepage Fixes fs/btrfs/extent_io.c:2861: warning: \u0027ret\u0027 may be used uninitialized in this function\n- Btrfs: fix unprotected alloc list insertion during the finishing procedure of replace (bsc#1089215).\n- Btrfs: fix unprotected assignment of the target device (bsc#1089222).\n- Btrfs: fix unprotected deletion from pending_chunks list\n- Btrfs: fix unprotected device list access when getting the fs information (bsc#1089228).\n- Btrfs: fix unprotected device\u0027s variants on 32bits machine (bsc#1089227).\n- Btrfs: fix unprotected device-\u003ebytes_used update (bsc#1089225).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#1089240).\n- Btrfs: fix up read_tree_block to return proper error (bsc#1080837).\n- Btrfs: fix wrong device bytes_used in the super block (bsc#1089224).\n- Btrfs: fix wrong disk size when writing super blocks (bsc#1089223).\n- Btrfs: fix xattr loss after power failure (bsc#1094436).\n- Btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#1089013).\n- Btrfs: initialize the seq counter in struct btrfs_device (bsc#1094437).\n- Btrfs: iterate over unused chunk space in FITRIM\n- Btrfs: make btrfs_issue_discard return bytes discarded\n- Btrfs: make btrfs_search_forward return with nodes unlocked (bsc#1094422).\n- Btrfs: make sure to copy everything if we rename (bsc#1088997).\n- Btrfs: make the chunk allocator completely tree lockless (bsc#1089202).\n- Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead of btrfs_truncate (bsc#1089201).\n- Btrfs: nuke write_super from comments (bsc#1089199).\n- Btrfs: only drop modified extents if we logged the whole inode (bsc#1089213).\n- Btrfs: only update disk_i_size as we remove extents (bsc#1089209).\n- Btrfs: qgroup: return EINVAL if level of parent is not higher than child\u0027s (bsc#1089012).\n- Btrfs: remove deleted xattrs on fsync log replay (bsc#1089008).\n- Btrfs: remove empty block groups automatically\n- Btrfs: remove non-sense btrfs_error_discard_extent() function (bsc#1089230).\n- Btrfs: remove parameter blocksize from read_tree_block (bsc#1080837).\n- Btrfs: remove transaction from send (bsc#1089218).\n- Btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock\n- Btrfs: remove unused max_key arg from btrfs_search_forward (bsc#1094421).\n- Btrfs: return an error from btrfs_wait_ordered_range (bsc#1089212).\n- Btrfs: set inode\u0027s logged_trans/last_log_commit after ranged fsync (bsc#1093198).\n- Btrfs: skip superblocks during discard\n- Btrfs: stop refusing the relocation of chunk 0 (bsc#1089208).\n- Btrfs: update free_chunk_space during allocting a new chunk (bsc#1089226).\n- Btrfs: use global reserve when deleting unused block group after ENOSPC\n- Btrfs: use nodesize everywhere, kill leafsize (bsc#1080837).\n- Btrfs: wait ordered range before doing direct io (bsc#1089203).\n- Fix for bsc#1092497\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1087092).\n- IB/mlx4: Convert slave port before building address-handle (bug#919382).\n- KABI protect struct _lowcore (bsc#1089386).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- NFS: add nostatflush mount option (bsc#1065726).\n- NFS: allow flush-on-stat to be disabled (bsc#1065726).\n- Refresh patches.arch/14.1-x86-retpoline-fill-rsb-on-context-switch-for-affected-cpus.patch. Fix bnc#1097948.\n- Revert \u0027NFS: allow flush-on-stat to be disabled (bsc#1065726).\u0027 \n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1090888).\n- USB: hub: fix SS hub-descriptor handling (bsc#1092372).\n- Update config files, add Spectre mitigation for s390x (bnc#1089386, ).\n- Update s390 config files (bsc#1089386).\n- Xen counterparts of eager FPU implementation.\n- balloon: do not BUG() when balloon is empty (bsc#1083347).\n- cifs: fix crash due to race in hmac(md5) handling (bsc#1091671).\n- config.sh: set BUGZILLA_PRODUCT for SLE11-SP4\n- constraints: ppc64 does not build with 2.5G memory\n- fanotify: fix logic of events on child (bsc#1013018).\n- fs: btrfs: volumes.c: Fix for possible null pointer dereference (bsc#1089219).\n- ipc/msg: Fix faulty parsing of msgctl args (bsc#1093600,bsc#1072689).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kernel: Fix memory leak on EP11 target list processing (bnc#1096746, ).\n- kvm/powerpc: Add new ioctl to retreive server MMU infos (bsc#1094244).\n- kvm/x86: fix icebp instruction handling (bsc#1087088).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1090888).\n- module: Fix locking in symbol_put_addr() (bsc#1097445).\n- netfront: make req_prod check properly deal with index wraps (bsc#1046610).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1013018).\n- powerpc, KVM: Split HVMODE_206 cpu feature bit into separate HV and architecture bits (bsc#1087082).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix compiler store ordering to SLB shadow area (bsc#1094244).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Improve RFI L1-D cache flush fallback (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bsc#1094244).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Define MCE error event section (bsc#1094244).\n- powerpc/pseries: Display machine check error details (bsc#1094244).\n- powerpc/pseries: Dump and flush SLB contents on SLB MCE errors (bsc#1094244).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/pseries: convert rtas_log_buf to linear allocation (bsc#1094244).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Fix /proc/cpuinfo revision for POWER9 DD2 (bsc#1093710).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075088, bsc#1091815).\n- powerpc: Move local setup.h declarations to arch includes (bsc#1068032, bsc#1075088, bsc#1091815). \n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1091659, ).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096746, ).\n- s390/dasd: fix IO error for newly defined devices (bnc#1091659, ).\n- s390/dasd: fix failing path verification (bnc#1096746, ).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1091659, ).\n- s390/qeth: on channel error, reject further cmd requests (bnc#1088343, ).\n- s390: add automatic detection of the spectre defense (bnc#1089386, ).\n- s390: add optimized array_index_mask_nospec (bnc#1089386, ).\n- s390: add sysfs attributes for spectre (bnc#1089386, ).\n- s390: correct module section names for expoline code revert (bsc#1089386).\n- s390: correct nospec auto detection init order (bnc#1089386, ).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1089386, ).\n- s390: fix retpoline build on 31bit (bsc#1089386).\n- s390: improve cpu alternative handling for gmb and nobp (bnc#1089386, ).\n- s390: introduce execute-trampolines for branches (bnc#1089386, ).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1089386, ).\n- s390: report spectre mitigation via syslog (bnc#1089386, ).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1089386, ).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1089386, ).\n- series.conf: fix the header It was corrupted back in 2015.\n- trace: module: Maintain a valid user count (bsc#1097443).\n- tracing: Create seq_buf layer in trace_seq (bsc#1091815).\n- x86, mce: Fix mce_start_timer semantics (bsc#1090607).\n- x86/Xen: disable IBRS around CPU stopper function invocation (none so far).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1090630)\n- x86/kaiser: symbol kaiser_set_shadow_pgd() exported with non GPL\n- x86: Fix /proc/mtrr with base/size more than 44bits (bsc#1052351).\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088).\n- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).\n- xfs: fix buffer use after free on IO error (bsc#1052943).\n- xfs: only update the last_sync_lsn when a transaction completes (bsc#989401).\n- xfs: prevent recursion in xfs_buf_iorequest (bsc#1052943).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slertesp4-kernel-source-13686",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1846-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1846-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181846-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1846-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html"
},
{
"category": "self",
"summary": "SUSE Bug 1013018",
"url": "https://bugzilla.suse.com/1013018"
},
{
"category": "self",
"summary": "SUSE Bug 1046610",
"url": "https://bugzilla.suse.com/1046610"
},
{
"category": "self",
"summary": "SUSE Bug 1052351",
"url": "https://bugzilla.suse.com/1052351"
},
{
"category": "self",
"summary": "SUSE Bug 1052943",
"url": "https://bugzilla.suse.com/1052943"
},
{
"category": "self",
"summary": "SUSE Bug 1065726",
"url": "https://bugzilla.suse.com/1065726"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068054",
"url": "https://bugzilla.suse.com/1068054"
},
{
"category": "self",
"summary": "SUSE Bug 1070404",
"url": "https://bugzilla.suse.com/1070404"
},
{
"category": "self",
"summary": "SUSE Bug 1072689",
"url": "https://bugzilla.suse.com/1072689"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075088",
"url": "https://bugzilla.suse.com/1075088"
},
{
"category": "self",
"summary": "SUSE Bug 1079152",
"url": "https://bugzilla.suse.com/1079152"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1080837",
"url": "https://bugzilla.suse.com/1080837"
},
{
"category": "self",
"summary": "SUSE Bug 1083347",
"url": "https://bugzilla.suse.com/1083347"
},
{
"category": "self",
"summary": "SUSE Bug 1084760",
"url": "https://bugzilla.suse.com/1084760"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087086",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "self",
"summary": "SUSE Bug 1087088",
"url": "https://bugzilla.suse.com/1087088"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1088343",
"url": "https://bugzilla.suse.com/1088343"
},
{
"category": "self",
"summary": "SUSE Bug 1088997",
"url": "https://bugzilla.suse.com/1088997"
},
{
"category": "self",
"summary": "SUSE Bug 1088998",
"url": "https://bugzilla.suse.com/1088998"
},
{
"category": "self",
"summary": "SUSE Bug 1088999",
"url": "https://bugzilla.suse.com/1088999"
},
{
"category": "self",
"summary": "SUSE Bug 1089000",
"url": "https://bugzilla.suse.com/1089000"
},
{
"category": "self",
"summary": "SUSE Bug 1089001",
"url": "https://bugzilla.suse.com/1089001"
},
{
"category": "self",
"summary": "SUSE Bug 1089002",
"url": "https://bugzilla.suse.com/1089002"
},
{
"category": "self",
"summary": "SUSE Bug 1089003",
"url": "https://bugzilla.suse.com/1089003"
},
{
"category": "self",
"summary": "SUSE Bug 1089004",
"url": "https://bugzilla.suse.com/1089004"
},
{
"category": "self",
"summary": "SUSE Bug 1089005",
"url": "https://bugzilla.suse.com/1089005"
},
{
"category": "self",
"summary": "SUSE Bug 1089006",
"url": "https://bugzilla.suse.com/1089006"
},
{
"category": "self",
"summary": "SUSE Bug 1089007",
"url": "https://bugzilla.suse.com/1089007"
},
{
"category": "self",
"summary": "SUSE Bug 1089008",
"url": "https://bugzilla.suse.com/1089008"
},
{
"category": "self",
"summary": "SUSE Bug 1089010",
"url": "https://bugzilla.suse.com/1089010"
},
{
"category": "self",
"summary": "SUSE Bug 1089011",
"url": "https://bugzilla.suse.com/1089011"
},
{
"category": "self",
"summary": "SUSE Bug 1089012",
"url": "https://bugzilla.suse.com/1089012"
},
{
"category": "self",
"summary": "SUSE Bug 1089013",
"url": "https://bugzilla.suse.com/1089013"
},
{
"category": "self",
"summary": "SUSE Bug 1089016",
"url": "https://bugzilla.suse.com/1089016"
},
{
"category": "self",
"summary": "SUSE Bug 1089192",
"url": "https://bugzilla.suse.com/1089192"
},
{
"category": "self",
"summary": "SUSE Bug 1089199",
"url": "https://bugzilla.suse.com/1089199"
},
{
"category": "self",
"summary": "SUSE Bug 1089200",
"url": "https://bugzilla.suse.com/1089200"
},
{
"category": "self",
"summary": "SUSE Bug 1089201",
"url": "https://bugzilla.suse.com/1089201"
},
{
"category": "self",
"summary": "SUSE Bug 1089202",
"url": "https://bugzilla.suse.com/1089202"
},
{
"category": "self",
"summary": "SUSE Bug 1089203",
"url": "https://bugzilla.suse.com/1089203"
},
{
"category": "self",
"summary": "SUSE Bug 1089204",
"url": "https://bugzilla.suse.com/1089204"
},
{
"category": "self",
"summary": "SUSE Bug 1089205",
"url": "https://bugzilla.suse.com/1089205"
},
{
"category": "self",
"summary": "SUSE Bug 1089206",
"url": "https://bugzilla.suse.com/1089206"
},
{
"category": "self",
"summary": "SUSE Bug 1089207",
"url": "https://bugzilla.suse.com/1089207"
},
{
"category": "self",
"summary": "SUSE Bug 1089208",
"url": "https://bugzilla.suse.com/1089208"
},
{
"category": "self",
"summary": "SUSE Bug 1089209",
"url": "https://bugzilla.suse.com/1089209"
},
{
"category": "self",
"summary": "SUSE Bug 1089210",
"url": "https://bugzilla.suse.com/1089210"
},
{
"category": "self",
"summary": "SUSE Bug 1089211",
"url": "https://bugzilla.suse.com/1089211"
},
{
"category": "self",
"summary": "SUSE Bug 1089212",
"url": "https://bugzilla.suse.com/1089212"
},
{
"category": "self",
"summary": "SUSE Bug 1089213",
"url": "https://bugzilla.suse.com/1089213"
},
{
"category": "self",
"summary": "SUSE Bug 1089214",
"url": "https://bugzilla.suse.com/1089214"
},
{
"category": "self",
"summary": "SUSE Bug 1089215",
"url": "https://bugzilla.suse.com/1089215"
},
{
"category": "self",
"summary": "SUSE Bug 1089216",
"url": "https://bugzilla.suse.com/1089216"
},
{
"category": "self",
"summary": "SUSE Bug 1089217",
"url": "https://bugzilla.suse.com/1089217"
},
{
"category": "self",
"summary": "SUSE Bug 1089218",
"url": "https://bugzilla.suse.com/1089218"
},
{
"category": "self",
"summary": "SUSE Bug 1089219",
"url": "https://bugzilla.suse.com/1089219"
},
{
"category": "self",
"summary": "SUSE Bug 1089220",
"url": "https://bugzilla.suse.com/1089220"
},
{
"category": "self",
"summary": "SUSE Bug 1089221",
"url": "https://bugzilla.suse.com/1089221"
},
{
"category": "self",
"summary": "SUSE Bug 1089222",
"url": "https://bugzilla.suse.com/1089222"
},
{
"category": "self",
"summary": "SUSE Bug 1089223",
"url": "https://bugzilla.suse.com/1089223"
},
{
"category": "self",
"summary": "SUSE Bug 1089224",
"url": "https://bugzilla.suse.com/1089224"
},
{
"category": "self",
"summary": "SUSE Bug 1089225",
"url": "https://bugzilla.suse.com/1089225"
},
{
"category": "self",
"summary": "SUSE Bug 1089226",
"url": "https://bugzilla.suse.com/1089226"
},
{
"category": "self",
"summary": "SUSE Bug 1089227",
"url": "https://bugzilla.suse.com/1089227"
},
{
"category": "self",
"summary": "SUSE Bug 1089228",
"url": "https://bugzilla.suse.com/1089228"
},
{
"category": "self",
"summary": "SUSE Bug 1089229",
"url": "https://bugzilla.suse.com/1089229"
},
{
"category": "self",
"summary": "SUSE Bug 1089230",
"url": "https://bugzilla.suse.com/1089230"
},
{
"category": "self",
"summary": "SUSE Bug 1089231",
"url": "https://bugzilla.suse.com/1089231"
},
{
"category": "self",
"summary": "SUSE Bug 1089232",
"url": "https://bugzilla.suse.com/1089232"
},
{
"category": "self",
"summary": "SUSE Bug 1089233",
"url": "https://bugzilla.suse.com/1089233"
},
{
"category": "self",
"summary": "SUSE Bug 1089234",
"url": "https://bugzilla.suse.com/1089234"
},
{
"category": "self",
"summary": "SUSE Bug 1089235",
"url": "https://bugzilla.suse.com/1089235"
},
{
"category": "self",
"summary": "SUSE Bug 1089236",
"url": "https://bugzilla.suse.com/1089236"
},
{
"category": "self",
"summary": "SUSE Bug 1089237",
"url": "https://bugzilla.suse.com/1089237"
},
{
"category": "self",
"summary": "SUSE Bug 1089238",
"url": "https://bugzilla.suse.com/1089238"
},
{
"category": "self",
"summary": "SUSE Bug 1089239",
"url": "https://bugzilla.suse.com/1089239"
},
{
"category": "self",
"summary": "SUSE Bug 1089240",
"url": "https://bugzilla.suse.com/1089240"
},
{
"category": "self",
"summary": "SUSE Bug 1089241",
"url": "https://bugzilla.suse.com/1089241"
},
{
"category": "self",
"summary": "SUSE Bug 1089386",
"url": "https://bugzilla.suse.com/1089386"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1090607",
"url": "https://bugzilla.suse.com/1090607"
},
{
"category": "self",
"summary": "SUSE Bug 1090630",
"url": "https://bugzilla.suse.com/1090630"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1091659",
"url": "https://bugzilla.suse.com/1091659"
},
{
"category": "self",
"summary": "SUSE Bug 1091671",
"url": "https://bugzilla.suse.com/1091671"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1091815",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "self",
"summary": "SUSE Bug 1092372",
"url": "https://bugzilla.suse.com/1092372"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1093194",
"url": "https://bugzilla.suse.com/1093194"
},
{
"category": "self",
"summary": "SUSE Bug 1093195",
"url": "https://bugzilla.suse.com/1093195"
},
{
"category": "self",
"summary": "SUSE Bug 1093196",
"url": "https://bugzilla.suse.com/1093196"
},
{
"category": "self",
"summary": "SUSE Bug 1093197",
"url": "https://bugzilla.suse.com/1093197"
},
{
"category": "self",
"summary": "SUSE Bug 1093198",
"url": "https://bugzilla.suse.com/1093198"
},
{
"category": "self",
"summary": "SUSE Bug 1093600",
"url": "https://bugzilla.suse.com/1093600"
},
{
"category": "self",
"summary": "SUSE Bug 1093710",
"url": "https://bugzilla.suse.com/1093710"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE Bug 1094244",
"url": "https://bugzilla.suse.com/1094244"
},
{
"category": "self",
"summary": "SUSE Bug 1094421",
"url": "https://bugzilla.suse.com/1094421"
},
{
"category": "self",
"summary": "SUSE Bug 1094422",
"url": "https://bugzilla.suse.com/1094422"
},
{
"category": "self",
"summary": "SUSE Bug 1094423",
"url": "https://bugzilla.suse.com/1094423"
},
{
"category": "self",
"summary": "SUSE Bug 1094424",
"url": "https://bugzilla.suse.com/1094424"
},
{
"category": "self",
"summary": "SUSE Bug 1094425",
"url": "https://bugzilla.suse.com/1094425"
},
{
"category": "self",
"summary": "SUSE Bug 1094436",
"url": "https://bugzilla.suse.com/1094436"
},
{
"category": "self",
"summary": "SUSE Bug 1094437",
"url": "https://bugzilla.suse.com/1094437"
},
{
"category": "self",
"summary": "SUSE Bug 1096140",
"url": "https://bugzilla.suse.com/1096140"
},
{
"category": "self",
"summary": "SUSE Bug 1096242",
"url": "https://bugzilla.suse.com/1096242"
},
{
"category": "self",
"summary": "SUSE Bug 1096281",
"url": "https://bugzilla.suse.com/1096281"
},
{
"category": "self",
"summary": "SUSE Bug 1096746",
"url": "https://bugzilla.suse.com/1096746"
},
{
"category": "self",
"summary": "SUSE Bug 1097443",
"url": "https://bugzilla.suse.com/1097443"
},
{
"category": "self",
"summary": "SUSE Bug 1097445",
"url": "https://bugzilla.suse.com/1097445"
},
{
"category": "self",
"summary": "SUSE Bug 1097948",
"url": "https://bugzilla.suse.com/1097948"
},
{
"category": "self",
"summary": "SUSE Bug 919382",
"url": "https://bugzilla.suse.com/919382"
},
{
"category": "self",
"summary": "SUSE Bug 973378",
"url": "https://bugzilla.suse.com/973378"
},
{
"category": "self",
"summary": "SUSE Bug 989401",
"url": "https://bugzilla.suse.com/989401"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3665 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3665/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-06-29T09:36:25Z",
"generator": {
"date": "2018-06-29T09:36:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1846-1",
"initial_release_date": "2018-06-29T09:36:25Z",
"revision_history": [
{
"date": "2018-06-29T09:36:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt-base-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-source-rt-3.0.101.rt130-69.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64",
"product_id": "kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-29T09:36:25Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-29T09:36:25Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-29T09:36:25Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3665"
}
],
"notes": [
{
"category": "general",
"text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3665",
"url": "https://www.suse.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087086 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "external",
"summary": "SUSE Bug 1090338 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1090338"
},
{
"category": "external",
"summary": "SUSE Bug 1095241 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095241"
},
{
"category": "external",
"summary": "SUSE Bug 1095242 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "external",
"summary": "SUSE Bug 1096740 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1096740"
},
{
"category": "external",
"summary": "SUSE Bug 1100091 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100091"
},
{
"category": "external",
"summary": "SUSE Bug 1100555 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100555"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.27.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-29T09:36:25Z",
"details": "moderate"
}
],
"title": "CVE-2018-3665"
}
]
}
SUSE-SU-2018:1452-1
Vulnerability from csaf_suse - Published: 2018-05-28 13:59 - Updated: 2018-05-28 13:59Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\n- CVE-2018-3639: cpu: add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits pass through.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-libvirt-13626,slessp3-libvirt-13626",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1452-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1452-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181452-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1452-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-05-28T13:59:43Z",
"generator": {
"date": "2018-05-28T13:59:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1452-1",
"initial_release_date": "2018-05-28T13:59:43Z",
"revision_history": [
{
"date": "2018-05-28T13:59:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.9.1.i586",
"product": {
"name": "libvirt-1.0.5.9-21.9.1.i586",
"product_id": "libvirt-1.0.5.9-21.9.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.9.1.i586",
"product": {
"name": "libvirt-client-1.0.5.9-21.9.1.i586",
"product_id": "libvirt-client-1.0.5.9-21.9.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.9.1.i586",
"product": {
"name": "libvirt-doc-1.0.5.9-21.9.1.i586",
"product_id": "libvirt-doc-1.0.5.9-21.9.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.9.1.i586",
"product": {
"name": "libvirt-python-1.0.5.9-21.9.1.i586",
"product_id": "libvirt-python-1.0.5.9-21.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-1.0.5.9-21.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-client-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-client-1.0.5.9-21.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-doc-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-doc-1.0.5.9-21.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.9.1.s390x",
"product": {
"name": "libvirt-python-1.0.5.9-21.9.1.s390x",
"product_id": "libvirt-python-1.0.5.9-21.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-1.0.5.9-21.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-client-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-client-1.0.5.9-21.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-doc-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-doc-1.0.5.9-21.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-python-1.0.5.9-21.9.1.x86_64",
"product": {
"name": "libvirt-python-1.0.5.9-21.9.1.x86_64",
"product_id": "libvirt-python-1.0.5.9-21.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-client-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-doc-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.i586"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.s390x"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-1.0.5.9-21.9.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.x86_64"
},
"product_reference": "libvirt-python-1.0.5.9-21.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:libvirt-python-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-client-32bit-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-doc-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-lock-sanlock-1.0.5.9-21.9.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:libvirt-python-1.0.5.9-21.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-28T13:59:43Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1699-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:46 - Updated: 2018-10-18 12:46Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThis feature was added:\n\n- Added support for qemu monitor command \n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n\nThis non-security issue was fixed:\n\n- bsc#1086039 - Dom0 does not represent DomU cpu flags\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1142",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1699-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1699-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181699-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1699-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1086039",
"url": "https://bugzilla.suse.com/1086039"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-10-18T12:46:29Z",
"generator": {
"date": "2018-10-18T12:46:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1699-2",
"initial_release_date": "2018-10-18T12:46:29Z",
"revision_history": [
{
"date": "2018-10-18T12:46:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-doc-html-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-4.7.5_04-43.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"product_id": "xen-tools-domU-4.7.5_04-43.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-doc-html-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.7.5_04-43.33.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
},
"product_reference": "xen-tools-domU-4.7.5_04-43.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-doc-html-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-32bit-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-libs-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-4.7.5_04-43.33.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:xen-tools-domU-4.7.5_04-43.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:46:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:3064-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:51 - Updated: 2018-10-18 12:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_8_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_8_0-openjdk to the jdk8u181 (icedtea 3.9.0) release fixes the following issues:\n\nThese security issues were fixed:\n\n- CVE-2018-2938: Difficult to exploit vulnerability allowed unauthenticated\n attacker with network access via multiple protocols to compromise Java SE.\n Successful attacks of this vulnerability can result in takeover of Java SE\n (bsc#1101644).\n- CVE-2018-2940: Vulnerability in subcomponent: Libraries. Easily exploitable\n vulnerability allowed unauthenticated attacker with network access via multiple\n protocols to compromise Java SE, Java SE Embedded. Successful attacks require\n human interaction from a person other than the attacker. Successful attacks of\n this vulnerability can result in unauthorized read access to a subset of Java\n SE, Java SE Embedded accessible data (bsc#1101645)\n- CVE-2018-2952: Vulnerability in subcomponent: Concurrency. Difficult to\n exploit vulnerability allowed unauthenticated attacker with network access via\n multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful\n attacks of this vulnerability can result in unauthorized ability to cause a\n partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit\n (bsc#1101651)\n- CVE-2018-2973: Vulnerability in subcomponent: JSSE. Difficult to exploit\n vulnerability allowed unauthenticated attacker with network access via SSL/TLS\n to compromise Java SE, Java SE Embedded. Successful attacks of this\n vulnerability can result in unauthorized creation, deletion or modification\n access to critical data or all Java SE, Java SE Embedded accessible data\n (bsc#1101656)\n\nThese non-security issues were fixed:\n\n- Improve desktop file usage\n- Better Internet address support\n- speculative traps break when classes are redefined\n- sun/security/pkcs11/ec/ReadCertificates.java fails intermittently\n- Clean up code that saves the previous versions of redefined classes\n- Prevent SIGSEGV in ReceiverTypeData::clean_weak_klass_links\n- RedefineClasses() tests fail assert(((Metadata*)obj)-\u003eis_valid()) failed: obj is valid\n- NMT is not enabled if NMT option is specified after class path specifiers\n- EndEntityChecker should not process custom extensions after PKIX validation\n- SupportedDSAParamGen.java failed with timeout\n- Montgomery multiply intrinsic should use correct name\n- When determining the ciphersuite lists, there is no debug output for disabled suites.\n- sun/security/mscapi/SignedObjectChain.java fails on Windows\n- On Windows Swing changes keyboard layout on a window activation\n- IfNode::range_check_trap_proj() should handler dying subgraph with single if proj\n- Even better Internet address support\n- Newlines in JAXB string values of SOAP-requests are escaped to \u0027\u0026#xa;\u0027\n- TestFlushableGZIPOutputStream failing with IndexOutOfBoundsException\n- Unable to use JDWP API in JDK 8 to debug JDK 9 VM\n- Hotspot crash on Cassandra 3.11.1 startup with libnuma 2.0.3\n- Performance drop with Java JDK 1.8.0_162-b32\n- Upgrade time-zone data to tzdata2018d\n- Fix potential crash in BufImg_SetupICM\n- JDK 8u181 l10n resource file update\n- Remove debug print statements from RMI fix\n- (tz) Upgrade time-zone data to tzdata2018e\n- ObjectInputStream filterCheck method throws NullPointerException\n- adjust reflective access checks\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-2168",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3064-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3064-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183064-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3064-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101644",
"url": "https://bugzilla.suse.com/1101644"
},
{
"category": "self",
"summary": "SUSE Bug 1101645",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "self",
"summary": "SUSE Bug 1101651",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "self",
"summary": "SUSE Bug 1101656",
"url": "https://bugzilla.suse.com/1101656"
},
{
"category": "self",
"summary": "SUSE Bug 1106812",
"url": "https://bugzilla.suse.com/1106812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2940 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2952 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-2973 page",
"url": "https://www.suse.com/security/cve/CVE-2018-2973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for java-1_8_0-openjdk",
"tracking": {
"current_release_date": "2018-10-18T12:51:18Z",
"generator": {
"date": "2018-10-18T12:51:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3064-2",
"initial_release_date": "2018-10-18T12:51:18Z",
"revision_history": [
{
"date": "2018-10-18T12:51:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"product_id": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
},
"product_reference": "java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2938"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2938",
"url": "https://www.suse.com/security/cve/CVE-2018-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1101644 for CVE-2018-2938",
"url": "https://bugzilla.suse.com/1101644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:51:18Z",
"details": "important"
}
],
"title": "CVE-2018-2938"
},
{
"cve": "CVE-2018-2940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2940"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2940",
"url": "https://www.suse.com/security/cve/CVE-2018-2940"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2940",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:51:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-2940"
},
{
"cve": "CVE-2018-2952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2952"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2952",
"url": "https://www.suse.com/security/cve/CVE-2018-2952"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101651 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101651"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2952",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:51:18Z",
"details": "important"
}
],
"title": "CVE-2018-2952"
},
{
"cve": "CVE-2018-2973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-2973"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-2973",
"url": "https://www.suse.com/security/cve/CVE-2018-2973"
},
{
"category": "external",
"summary": "SUSE Bug 1101645 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101645"
},
{
"category": "external",
"summary": "SUSE Bug 1101656 for CVE-2018-2973",
"url": "https://bugzilla.suse.com/1101656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:51:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-2973"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.181-27.26.2.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:51:18Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2331-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:49 - Updated: 2018-10-18 12:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update to ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1573",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2331-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2331-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2331-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1089343",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "self",
"summary": "SUSE Bug 1104134",
"url": "https://bugzilla.suse.com/1104134"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
}
],
"title": "Security update to ucode-intel",
"tracking": {
"current_release_date": "2018-10-18T12:49:10Z",
"generator": {
"date": "2018-10-18T12:49:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2331-2",
"initial_release_date": "2018-10-18T12:49:10Z",
"revision_history": [
{
"date": "2018-10-18T12:49:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180807-13.29.1.x86_64",
"product": {
"name": "ucode-intel-20180807-13.29.1.x86_64",
"product_id": "ucode-intel-20180807-13.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:10Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:49:10Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
}
]
}
SUSE-SU-2021:3969-1
Vulnerability from csaf_suse - Published: 2021-12-07 14:31 - Updated: 2021-12-07 14:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\nUnprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0.\n (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2018-3639: Fixed a speculative execution that may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. (bsc#1087082)\n- CVE-2021-20320: Fix a bug that allows a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem. (bsc#1190601)\n- CVE-2021-0941: Fixed A missing sanity check to the current MTU check that may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. (bnc#1192045)\n- CVE-2021-31916: Fixed a bound check failure that could allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem. (bnc#1192781)\n- CVE-2021-20322: Fixed a bug that provides to an attacker the ability to quickly scan open UDP ports. (bsc#1191790)\n- CVE-2021-3772: Fixed an issue that would allow a blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses. (bsc#1190351)\n- CVE-2021-34981: Fixed an issue that allows an attacker with a local account to escalate privileges when CAPI (ISDN) hardware connection fails. (bsc#1191961)\n- CVE-2018-9517: Fixed possible memory corruption due to a use after free in pppol2tp_connect (bsc#1108488).\n- CVE-2019-3874: Fixed possible denial of service attack via SCTP socket buffer used by a userspace applications (bnc#1129898).\n- CVE-2019-3900: Fixed an infinite loop issue while handling incoming packets in handle_rx() (bnc#1133374).\n- CVE-2020-12770: Fixed sg_remove_request call in a certain failure cases (bsc#1171420).\n- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)\n- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).\n- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).\n- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).\n- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).\n- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-37159: Fixed use-after-free and a double free inside hso_free_net_device in drivers/net/usb/hso.c when unregister_netdev is called without checking for the NETREG_REGISTERED state (bnc#1188601).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)\n- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel\u0027s bluetooth module. (bsc#1190023)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)\n- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).\n- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).\n\nThe following non-security bugs were fixed:\n\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22913)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22913).\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- drm: fix spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- gigaset: fix spectre issue in do_data_b3_req (bsc#1192802).\n- hisax: fix spectre issues (bsc#1192802).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).\n- hysdn: fix spectre issue in hycapi_send_message (bsc#1192802).\n- infiniband: fix spectre issue in ib_uverbs_write (bsc#1192802).\n- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).\n- iwlwifi: fix spectre issue in iwl_dbgfs_update_pm (bsc#1192802).\n- media: dvb_ca_en50221: prevent using slot_info for Spectre attacs (bsc#1192802).\n- media: dvb_ca_en50221: sanity check slot number from userspace (bsc#1192802).\n- media: wl128x: get rid of a potential spectre issue (bsc#1192802).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- mpt3sas: fix spectre issues (bsc#1192802).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() (bsc#1192802).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- objtool: Do not fail on missing symbol table (bsc#1192379).\n- osst: fix spectre issue in osst_verify_frame (bsc#1192802).\n- ovl: check whiteout in ovl_create_over_whiteout() (bsc#1189846).\n- ovl: filter of trusted xattr results in audit (bsc#1189846).\n- ovl: fix dentry leak in ovl_get_redirect (bsc#1189846).\n- ovl: initialize error in ovl_copy_xattr (bsc#1189846).\n- ovl: relax WARN_ON() on rename to self (bsc#1189846).\n- s390/bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sysvipc/sem: mitigate semnum index against spectre v1 (bsc#1192802).\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3969,SUSE-SLE-Module-Live-Patching-15-2021-3969,SUSE-SLE-Product-HA-15-2021-3969,SUSE-SLE-Product-HPC-15-2021-3969,SUSE-SLE-Product-SLES-15-2021-3969,SUSE-SLE-Product-SLES_SAP-15-2021-3969",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3969-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3969-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213969-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3969-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
},
{
"category": "self",
"summary": "SUSE Bug 1085235",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1087078",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1100394",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "self",
"summary": "SUSE Bug 1102640",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "self",
"summary": "SUSE Bug 1105412",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "self",
"summary": "SUSE Bug 1108488",
"url": "https://bugzilla.suse.com/1108488"
},
{
"category": "self",
"summary": "SUSE Bug 1129898",
"url": "https://bugzilla.suse.com/1129898"
},
{
"category": "self",
"summary": "SUSE Bug 1133374",
"url": "https://bugzilla.suse.com/1133374"
},
{
"category": "self",
"summary": "SUSE Bug 1171420",
"url": "https://bugzilla.suse.com/1171420"
},
{
"category": "self",
"summary": "SUSE Bug 1173489",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "self",
"summary": "SUSE Bug 1174161",
"url": "https://bugzilla.suse.com/1174161"
},
{
"category": "self",
"summary": "SUSE Bug 1181854",
"url": "https://bugzilla.suse.com/1181854"
},
{
"category": "self",
"summary": "SUSE Bug 1184804",
"url": "https://bugzilla.suse.com/1184804"
},
{
"category": "self",
"summary": "SUSE Bug 1185377",
"url": "https://bugzilla.suse.com/1185377"
},
{
"category": "self",
"summary": "SUSE Bug 1185726",
"url": "https://bugzilla.suse.com/1185726"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1186482",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188983",
"url": "https://bugzilla.suse.com/1188983"
},
{
"category": "self",
"summary": "SUSE Bug 1188985",
"url": "https://bugzilla.suse.com/1188985"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189291",
"url": "https://bugzilla.suse.com/1189291"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1189400",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "self",
"summary": "SUSE Bug 1189706",
"url": "https://bugzilla.suse.com/1189706"
},
{
"category": "self",
"summary": "SUSE Bug 1189846",
"url": "https://bugzilla.suse.com/1189846"
},
{
"category": "self",
"summary": "SUSE Bug 1189884",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "self",
"summary": "SUSE Bug 1190023",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "self",
"summary": "SUSE Bug 1190025",
"url": "https://bugzilla.suse.com/1190025"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190159",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190479",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "self",
"summary": "SUSE Bug 1190534",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "self",
"summary": "SUSE Bug 1190601",
"url": "https://bugzilla.suse.com/1190601"
},
{
"category": "self",
"summary": "SUSE Bug 1190717",
"url": "https://bugzilla.suse.com/1190717"
},
{
"category": "self",
"summary": "SUSE Bug 1191193",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191317",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191800",
"url": "https://bugzilla.suse.com/1191800"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192379",
"url": "https://bugzilla.suse.com/1192379"
},
{
"category": "self",
"summary": "SUSE Bug 1192400",
"url": "https://bugzilla.suse.com/1192400"
},
{
"category": "self",
"summary": "SUSE Bug 1192775",
"url": "https://bugzilla.suse.com/1192775"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9517 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3874 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3900 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12770 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20320 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20320/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-22543 page",
"url": "https://www.suse.com/security/cve/CVE-2021-22543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35477 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3656 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3656/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3744 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3752 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3764 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-40490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-40490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41864 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42252/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-07T14:31:45Z",
"generator": {
"date": "2021-12-07T14:31:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3969-1",
"initial_release_date": "2021-12-07T14:31:45Z",
"revision_history": [
{
"date": "2021-12-07T14:31:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.78.2.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.78.2.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.78.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.78.2.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.78.2.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.78.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.78.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.78.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.78.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.78.1.noarch",
"product_id": "kernel-devel-4.12.14-150.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.78.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.78.2.noarch",
"product_id": "kernel-docs-4.12.14-150.78.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.78.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.78.2.noarch",
"product_id": "kernel-docs-html-4.12.14-150.78.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.78.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.78.1.noarch",
"product_id": "kernel-macros-4.12.14-150.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.78.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.78.1.noarch",
"product_id": "kernel-source-4.12.14-150.78.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.78.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.78.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.78.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.78.2.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.78.2.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.78.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.78.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.78.2.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.78.2.s390x",
"product_id": "kernel-obs-build-4.12.14-150.78.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.78.2.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.78.2.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.78.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.78.1.s390x",
"product_id": "kernel-syms-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.78.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.78.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.78.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.78.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.78.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.78.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.78.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.78.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.78.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.78.2.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.78.2.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.78.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.78.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.78.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.78.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.78.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.78.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.78.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-9517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9517"
}
],
"notes": [
{
"category": "general",
"text": "In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9517",
"url": "https://www.suse.com/security/cve/CVE-2018-9517"
},
{
"category": "external",
"summary": "SUSE Bug 1108488 for CVE-2018-9517",
"url": "https://bugzilla.suse.com/1108488"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "low"
}
],
"title": "CVE-2018-9517"
},
{
"cve": "CVE-2019-3874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3874"
}
],
"notes": [
{
"category": "general",
"text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3874",
"url": "https://www.suse.com/security/cve/CVE-2019-3874"
},
{
"category": "external",
"summary": "SUSE Bug 1129898 for CVE-2019-3874",
"url": "https://bugzilla.suse.com/1129898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2019-3874"
},
{
"cve": "CVE-2019-3900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3900"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3900",
"url": "https://www.suse.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "SUSE Bug 1133374 for CVE-2019-3900",
"url": "https://bugzilla.suse.com/1133374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "low"
}
],
"title": "CVE-2019-3900"
},
{
"cve": "CVE-2020-12770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12770"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12770",
"url": "https://www.suse.com/security/cve/CVE-2020-12770"
},
{
"category": "external",
"summary": "SUSE Bug 1171420 for CVE-2020-12770",
"url": "https://bugzilla.suse.com/1171420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2020-12770"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20320"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20320",
"url": "https://www.suse.com/security/cve/CVE-2021-20320"
},
{
"category": "external",
"summary": "SUSE Bug 1190601 for CVE-2021-20320",
"url": "https://bugzilla.suse.com/1190601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-20320"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-22543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-22543"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-22543",
"url": "https://www.suse.com/security/cve/CVE-2021-22543"
},
{
"category": "external",
"summary": "SUSE Bug 1186482 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186482"
},
{
"category": "external",
"summary": "SUSE Bug 1186483 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1186483"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1197660 for CVE-2021-22543",
"url": "https://bugzilla.suse.com/1197660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-34556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34556"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34556",
"url": "https://www.suse.com/security/cve/CVE-2021-34556"
},
{
"category": "external",
"summary": "SUSE Bug 1188983 for CVE-2021-34556",
"url": "https://bugzilla.suse.com/1188983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-34556"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-35477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35477",
"url": "https://www.suse.com/security/cve/CVE-2021-35477"
},
{
"category": "external",
"summary": "SUSE Bug 1188985 for CVE-2021-35477",
"url": "https://bugzilla.suse.com/1188985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-35477"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3656",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3656"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3656",
"url": "https://www.suse.com/security/cve/CVE-2021-3656"
},
{
"category": "external",
"summary": "SUSE Bug 1189400 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189400"
},
{
"category": "external",
"summary": "SUSE Bug 1189418 for CVE-2021-3656",
"url": "https://bugzilla.suse.com/1189418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-3656"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3732",
"url": "https://www.suse.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "SUSE Bug 1189706 for CVE-2021-3732",
"url": "https://bugzilla.suse.com/1189706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3732"
},
{
"cve": "CVE-2021-3744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3744"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3744",
"url": "https://www.suse.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3744",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3744"
},
{
"cve": "CVE-2021-3752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3752",
"url": "https://www.suse.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "SUSE Bug 1190023 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "external",
"summary": "SUSE Bug 1190432 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3764"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3764",
"url": "https://www.suse.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1190534"
},
{
"category": "external",
"summary": "SUSE Bug 1194518 for CVE-2021-3764",
"url": "https://bugzilla.suse.com/1194518"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3764"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-38204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38204"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38204",
"url": "https://www.suse.com/security/cve/CVE-2021-38204"
},
{
"category": "external",
"summary": "SUSE Bug 1189291 for CVE-2021-38204",
"url": "https://bugzilla.suse.com/1189291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-40490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-40490"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-40490",
"url": "https://www.suse.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "SUSE Bug 1190159 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "external",
"summary": "SUSE Bug 1192775 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1192775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "moderate"
}
],
"title": "CVE-2021-40490"
},
{
"cve": "CVE-2021-41864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41864"
}
],
"notes": [
{
"category": "general",
"text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41864",
"url": "https://www.suse.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "SUSE Bug 1191317 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "external",
"summary": "SUSE Bug 1191318 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42252"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42252",
"url": "https://www.suse.com/security/cve/CVE-2021-42252"
},
{
"category": "external",
"summary": "SUSE Bug 1190479 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "external",
"summary": "SUSE Bug 1192444 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1192444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_78-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.78.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.78.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.78.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.78.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-07T14:31:45Z",
"details": "important"
}
],
"title": "CVE-2021-42252"
}
]
}
SUSE-SU-2018:1374-1
Vulnerability from csaf_suse - Published: 2018-05-22 13:21 - Updated: 2018-05-22 13:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive several security fixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c allowed\n local users to cause a denial of service (use-after-free) or possibly\n have unspecified other impact via crafted system calls (bnc#1091755).\n\nThe following non-security bugs were fixed:\n\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/cpu/intel: Introduce macros for Intel family numbers (bsc#985025).\n- x86/cpu/intel: Introduce macros for Intel family numbers (bsc985025).\n- x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist (bsc#1087845).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2018-959,SUSE-SLE-SERVER-12-2018-959",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1374-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1374-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1374-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087845",
"url": "https://bugzilla.suse.com/1087845"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1091755",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE Bug 985025",
"url": "https://bugzilla.suse.com/985025"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10675 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T13:21:02Z",
"generator": {
"date": "2018-05-22T13:21:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1374-1",
"initial_release_date": "2018-05-22T13:21:02Z",
"revision_history": [
{
"date": "2018-05-22T13:21:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.61-52.133.1.noarch",
"product": {
"name": "kernel-devel-3.12.61-52.133.1.noarch",
"product_id": "kernel-devel-3.12.61-52.133.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.61-52.133.1.noarch",
"product": {
"name": "kernel-macros-3.12.61-52.133.1.noarch",
"product_id": "kernel-macros-3.12.61-52.133.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.61-52.133.1.noarch",
"product": {
"name": "kernel-source-3.12.61-52.133.1.noarch",
"product_id": "kernel-source-3.12.61-52.133.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.133.1.ppc64le",
"product": {
"name": "kernel-default-3.12.61-52.133.1.ppc64le",
"product_id": "kernel-default-3.12.61-52.133.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.133.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.61-52.133.1.ppc64le",
"product_id": "kernel-default-base-3.12.61-52.133.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.133.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.61-52.133.1.ppc64le",
"product_id": "kernel-default-devel-3.12.61-52.133.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.133.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.61-52.133.1.ppc64le",
"product_id": "kernel-syms-3.12.61-52.133.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.133.1.s390x",
"product": {
"name": "kernel-default-3.12.61-52.133.1.s390x",
"product_id": "kernel-default-3.12.61-52.133.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.133.1.s390x",
"product": {
"name": "kernel-default-base-3.12.61-52.133.1.s390x",
"product_id": "kernel-default-base-3.12.61-52.133.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.133.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.61-52.133.1.s390x",
"product_id": "kernel-default-devel-3.12.61-52.133.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.61-52.133.1.s390x",
"product": {
"name": "kernel-default-man-3.12.61-52.133.1.s390x",
"product_id": "kernel-default-man-3.12.61-52.133.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.133.1.s390x",
"product": {
"name": "kernel-syms-3.12.61-52.133.1.s390x",
"product_id": "kernel-syms-3.12.61-52.133.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.61-52.133.1.x86_64",
"product_id": "kernel-ec2-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-default-3.12.61-52.133.1.x86_64",
"product_id": "kernel-default-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.61-52.133.1.x86_64",
"product_id": "kernel-default-base-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.61-52.133.1.x86_64",
"product_id": "kernel-default-devel-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-syms-3.12.61-52.133.1.x86_64",
"product_id": "kernel-syms-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-xen-3.12.61-52.133.1.x86_64",
"product_id": "kernel-xen-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.61-52.133.1.x86_64",
"product_id": "kernel-xen-base-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.61-52.133.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.61-52.133.1.x86_64",
"product_id": "kernel-xen-devel-3.12.61-52.133.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64",
"product_id": "kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.133.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le"
},
"product_reference": "kernel-default-3.12.61-52.133.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.133.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x"
},
"product_reference": "kernel-default-3.12.61-52.133.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-default-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.133.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.61-52.133.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.133.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x"
},
"product_reference": "kernel-default-base-3.12.61-52.133.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.133.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.61-52.133.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.133.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.61-52.133.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.61-52.133.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x"
},
"product_reference": "kernel-default-man-3.12.61-52.133.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.61-52.133.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch"
},
"product_reference": "kernel-devel-3.12.61-52.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.61-52.133.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch"
},
"product_reference": "kernel-macros-3.12.61-52.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.61-52.133.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch"
},
"product_reference": "kernel-source-3.12.61-52.133.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.133.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.61-52.133.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.133.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x"
},
"product_reference": "kernel-syms-3.12.61-52.133.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-syms-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-xen-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.61-52.133.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.61-52.133.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T13:21:02Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10675"
}
],
"notes": [
{
"category": "general",
"text": "The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10675",
"url": "https://www.suse.com/security/cve/CVE-2018-10675"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1091755 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1091755"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-10675",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T13:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-10675"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.133.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.133.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-default-1-1.5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_133-xen-1-1.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T13:21:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1816-1
Vulnerability from csaf_suse - Published: 2018-06-26 11:39 - Updated: 2018-06-26 11:39Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.138 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036)\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400)\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers\n to obtain potentially sensitive information from kernel memory, aka a\n write_mmio stack-based out-of-bounds read (bnc#1073311)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082).\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643).\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353)\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob\n that contains a jump but lacks a user-defined chain, which allowed local users\n to cause a denial of service (NULL pointer dereference) by leveraging the\n CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895)\n\nThe following non-security bugs were fixed:\n\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bnc#1012382).\n- ALSA: aloop: Mark paused device as inactive (bnc#1012382).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: fix a redundant-copy issue (bnc#1012382).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).\n- ALSA: hda - New VIA controller suppor no-snoop path (bnc#1012382).\n- ALSA: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bnc#1012382).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).\n- ALSA: hda: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: line6: Use correct endpoint type for midi output (bnc#1012382).\n- ALSA: opl3: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bnc#1012382).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).\n- ALSA: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bnc#1012382).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).\n- ALSA: vmaster: Propagate slave error (bnc#1012382).\n- ARC: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).\n- ARM: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).\n- ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).\n- ARM: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).\n- ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).\n- ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).\n- ARM: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).\n- ARM: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).\n- ARM: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).\n- ARM: OMAP: Fix dmtimer init for omap1 (bnc#1012382).\n- ARM: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (bnc#1012382).\n- ARM: amba: Fix race condition with driver_override (bnc#1012382).\n- ARM: amba: Make driver_override output consistent with other buses (bnc#1012382).\n- ARM: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).\n- ARM: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).\n- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).\n- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).\n- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).\n- Btrfs: Fix possible softlock on single core machines (bnc#1012382).\n- Btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).\n- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).\n- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).\n- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).\n- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).\n- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).\n- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).\n- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).\n- Btrfs: fix xattr loss after power failure (bnc#1012382).\n- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).\n- Btrfs: set plug for fsync (bnc#1012382).\n- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).\n- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).\n- Correct the prefix in references tag in previous patches (bsc#1041740).\n- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).\n- ENABLE_IBRS clobbers %rax which it shouldn\u0027t do\n- Enable uinput driver (bsc#1092566).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- Fixes typo for (watchdog: hpwdt: Update nmi_panic message) (bsc#1085185).\n- Force log to disk before reading the AGF during a fstrim (bnc#1012382).\n- HID: Fix hid_report_len usage (bnc#1012382).\n- HID: core: Fix size as type u32 (bnc#1012382).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).\n- HID: i2c-hid: fix size check and type usage (bnc#1012382).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).\n- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bnc#1012382).\n- IB/srp: Fix completion vector assignment algorithm (bnc#1012382).\n- IB/srp: Fix srp_abort() (bnc#1012382).\n- Input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).\n- Input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).\n- Input: ALPS - fix trackstick button handling on V8 devices (git-fixes).\n- Input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bnc#1012382).\n- Input: drv260x - fix initializing overdrive voltage (bnc#1012382).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).\n- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).\n- Input: leds - fix out of bound access (bnc#1012382).\n- KEYS: DNS: limit the length of option strings (bnc#1012382).\n- KVM: Fix spelling mistake: \u0027cop_unsuable\u0027 -\u003e \u0027cop_unusable\u0027 (bnc#1012382).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).\n- KVM: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).\n- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).\n- KVM: s390: Enable all facility bits that are known good for passthrough (bnc#1012382 bsc#1073059 bsc#1076805).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- KVM: x86: introduce linear_{read,write}_system (bnc#1012382).\n- KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).\n- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).\n- MIPS: Fix ptrace(2) PTRACE_PEEKUSR and PTRACE_POKEUSR accesses to o32 FGRs (bnc#1012382).\n- MIPS: Octeon: Fix logging messages with spurious periods after newlines (bnc#1012382).\n- MIPS: TXx9: use IS_BUILTIN() for CONFIG_LEDS_CLASS (bnc#1012382).\n- MIPS: ath79: Fix AR724X_PLL_REG_PCIE_CONFIG offset (bnc#1012382).\n- MIPS: memset.S: EVA and fault support for small_memset (bnc#1012382).\n- MIPS: memset.S: Fix clobber of v1 in last_fixup (bnc#1012382).\n- MIPS: memset.S: Fix return of __clear_user from Lpartial_fixup (bnc#1012382).\n- MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests (bnc#1012382).\n- MIPS: ptrace: Expose FIR register through FP regset (bnc#1012382).\n- MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs (bnc#1012382).\n- MIPS: uaccess: Add micromips clobbers to bzero invocation (bnc#1012382).\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bnc#1012382).\n- NFC: llcp: Limit size of SDP URI (bnc#1012382).\n- NFSv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).\n- PCI: Restore config space on runtime resume despite being unbound (bnc#1012382).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094268).\n- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).\n- RDMA/mlx5: Protect from shift operand overflow (bnc#1012382).\n- RDMA/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1022604).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bnc#1012382).\n- RDMA/ucma: Correct option size check using optlen (bnc#1012382).\n- RDMA/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).\n- RDS: IB: Fix null pointer issue (bnc#1012382).\n- Revert \u0027ARM: dts: imx6qdl-wandboard: Fix audio channel swap\u0027 (bnc#1012382).\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bnc#1012382).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- Revert \u0027ath10k: rebuild crypto header in rx data frames\u0027 (kabi).\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bnc#1012382).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Revert \u0027ima: limit file hash setting by user to fix and log modes\u0027 (bnc#1012382).\n- Revert \u0027ipc/shm: Fix shmat mmap nil-page protection\u0027 (bnc#1012382).\n- Revert \u0027perf tests: Decompress kernel module before objdump\u0027 (bnc#1012382).\n- Revert \u0027vti4: Do not override MTU passed on link creation via IFLA_MTU\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 3e75a004de79c213a2c919144da3d413922661db.\n- Revert \u0027x86/fpu: Hard-disable lazy FPU mode\u0027 (compatibility).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bnc#1012382 bsc#1092888).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: Increment wakeup count on remote wakeup (bnc#1012382).\n- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).\n- USB: serial: cp210x: add ID for NI USB serial console (bnc#1012382).\n- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).\n- USB: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).\n- USB: serial: option: Add support for Quectel EP06 (bnc#1012382).\n- USB: serial: option: adding support for ublox R410M (bnc#1012382).\n- USB: serial: option: reimplement interface masking (bnc#1012382).\n- USB: serial: simple: add libtransistor console (bnc#1012382).\n- USB: serial: visor: handle potential invalid device configuration (bnc#1012382).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).\n- Update config files, add expoline for s390x (bsc#1089393).\n- af_key: Always verify length of provided sadb_key (bnc#1012382).\n- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).\n- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).\n- arm64: do not call C code with el0\u0027s fp register (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).\n- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).\n- asm-generic: provide generic_pmdp_establish() (bnc#1012382).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath10k: rebuild crypto header in rx data frames (bnc#1012382).\n- ath9k_hw: check if the chip failed to wake up (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).\n- audit: return on memory error to avoid null pointer dereference (bnc#1012382).\n- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).\n- autofs: change autofs4_wait() to take struct path (bsc#1086716).\n- autofs: mount point create should honour passed in mode (bnc#1012382).\n- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).\n- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).\n- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).\n- batman-adv: fix packet checksum in receive path (bnc#1012382).\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).\n- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).\n- bcache: fix for allocator and register thread race (bnc#1012382).\n- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).\n- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).\n- bcache: return attach error when no cache set exist (bnc#1012382).\n- bdi: Fix oops in wb_workfn() (bnc#1012382).\n- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)\n- block/loop: fix deadlock after loop_set_status (bnc#1012382).\n- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).\n- block: sanity check for integrity intervals (bsc#1091728).\n- bnx2x: use the right constant (bnc#1012382).\n- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).\n- bonding: do not allow rlb updates to invalid mac (bnc#1012382).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).\n- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).\n- bpf: map_get_next_key to return first key on NULL (bnc#1012382).\n- brcmfmac: Fix check for ISO3166 code (bnc#1012382).\n- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bnc#1012382).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).\n- ceph: do not check quota for snap inode (bsc#1089115).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix race of queuing delayed caps (bsc#1096214).\n- ceph: fix root quota realm check (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: quota: add counter for snaprealms with quota (bsc#1089115).\n- ceph: quota: add initial infrastructure to support cephfs quotas (bsc#1089115).\n- ceph: quota: cache inode pointer in ceph_snap_realm (bsc#1089115).\n- ceph: quota: do not allow cross-quota renames (bsc#1089115).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_bytes (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_files (bsc#1089115).\n- ceph: quota: update MDS when max_bytes is approaching (bsc#1089115).\n- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).\n- cfg80211: further limit wiphy names to 64 bytes (git-fixes).\n- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).\n- cifs: Use file_dentry() (bsc#1093008).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- clk: Do not show the incorrect clock phase (bnc#1012382).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).\n- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).\n- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).\n- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).\n- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).\n- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).\n- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).\n- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bnc#1012382).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).\n- cxgb4: Setup FW queues before registering netdev (bsc#1022743).\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).\n- dccp: fix tasklet usage (bnc#1012382).\n- dccp: initialize ireq-\u003eir_mark (bnc#1012382).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).\n- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).\n- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).\n- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).\n- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).\n- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).\n- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).\n- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).\n- drm/virtio: fix vq wait_event condition (bnc#1012382).\n- drm/vmwgfx: Fix a buffer object leak (bnc#1012382).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).\n- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).\n- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).\n- efi: Avoid potential crashes, fix the \u0027struct efi_pci_io_protocol_32\u0027 definition for mixed mode (bnc#1012382).\n- enic: enable rq before updating rq descriptors (bnc#1012382).\n- enic: set DMA mask to 47 bit (bnc#1012382).\n- ext2: fix a block leak (bnc#1012382).\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: add validity checks for bitmap block numbers (bnc#1012382).\n- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).\n- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).\n- ext4: fix bitmap position validation (bnc#1012382).\n- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).\n- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).\n- fanotify: fix logic of events on child (bnc#1012382).\n- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).\n- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).\n- fix io_destroy()/aio_complete() race (bnc#1012382).\n- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).\n- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).\n- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).\n- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).\n- futex: futex_wake_op, do not fail on invalid op (git-fixes).\n- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).\n- getname_kernel() needs to make sure that -\u003ename != -\u003einame in long case (bnc#1012382).\n- gfs2: Fix fallocate chunk size (bnc#1012382).\n- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).\n- gpio: No NULL owner (bnc#1012382).\n- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).\n- gpmi-nand: Handle ECC Errors in erased pages (bnc#1012382).\n- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).\n- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).\n- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).\n- hwrng: stm32 - add reset during probe (bnc#1012382).\n- hwtracing: stm: fix build error on some arches (bnc#1012382).\n- hypfs_kill_super(): deal with failed allocations (bnc#1012382).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).\n- i2c: rcar: check master irqs before slave irqs (bnc#1012382).\n- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).\n- i2c: rcar: init new messages in irq (bnc#1012382).\n- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).\n- i2c: rcar: refactor setup of a msg (bnc#1012382).\n- i2c: rcar: remove spinlock (bnc#1012382).\n- i2c: rcar: remove unused IOERROR state (bnc#1012382).\n- i2c: rcar: revoke START request early (bnc#1012382).\n- i2c: rcar: rework hw init (bnc#1012382).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- iio:kfifo_buf: check for uint overflow (bnc#1012382).\n- ima: Fallback to the builtin hash algorithm (bnc#1012382).\n- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).\n- init: fix false positives in W+X checking (bsc#1096982).\n- iommu/vt-d: Fix a potential memory leak (bnc#1012382).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).\n- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).\n- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).\n- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).\n- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).\n- ipv4: remove warning in ip_recv_error (bnc#1012382).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (bnc#1012382).\n- irda: fix overly long udelay() (bnc#1012382).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).\n- isdn: eicon: fix a missing-check bug (bnc#1012382).\n- jbd2: fix use after free in kjournald2() (bnc#1012382).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (bnc#1012382 git-fixes).\n- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kabi: vfs: Restore dentry_operations-\u003ed_manage (bsc#1086716).\n- kasan: fix memory hotplug during boot (bnc#1012382).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).\n- kconfig: Do not leak main menus during parsing (bnc#1012382).\n- kconfig: Fix automatic menu creation mem leak (bnc#1012382).\n- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).\n- kdb: make \u0027mdr\u0027 command repeat (bnc#1012382).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).\n- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).\n- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, ).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- kobject: do not use WARN for registration failures (bnc#1012382).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).\n- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).\n- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bnc#1012382).\n- lan78xx: Correctly indicate invalid OTP (bnc#1012382).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bnc#1012382).\n- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, dax: fix 1GB-aligned namespaces vs physical misalignment\n- libnvdimm, namespace: use a safe lookup for dimm device name\n- libnvdimm, pfn: fix start_pad handling for aligned namespaces\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299).\n- llc: better deal with too small mtu (bnc#1012382).\n- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).\n- llc: hold llc_sap before release_sock() (bnc#1012382).\n- llc: properly handle dev_queue_xmit() return value (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bnc#1012382).\n- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).\n- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).\n- loop: handle short DIO reads (bsc#1094177).\n- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).\n- mac80211: Add RX flag to indicate ICV stripped (bnc#1012382).\n- mac80211: allow not sending MIC up from driver for HW crypto (bnc#1012382).\n- mac80211: allow same PN for AMSDU sub-frames (bnc#1012382).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).\n- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).\n- md/raid1: fix NULL pointer dereference (bnc#1012382).\n- md: document lifetime of internal rdev pointer (bsc#1056415).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1089023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).\n- md: raid5: avoid string overflow warning (bnc#1012382).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).\n- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).\n- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).\n- media: em28xx: USB bulk packet size fix (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).\n- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).\n- mm/ksm: fix interaction with THP (bnc#1012382).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).\n- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).\n- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).\n- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).\n- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: filemap: remove redundant code in do_read_cache_page (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).\n- mmap: introduce sane default mmap limits (bnc#1012382).\n- mmap: relax file size limit for regular files (bnc#1012382).\n- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).\n- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).\n- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).\n- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).\n- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).\n- net/mlx5: Protect from command bit overflow (bnc#1012382).\n- net/packet: refine check for priv area size (bnc#1012382).\n- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).\n- net: Fix untag for vlan packets without ethernet header (bnc#1012382).\n- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).\n- net: atm: Fix potential Spectre v1 (bnc#1012382).\n- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).\n- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).\n- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).\n- net: fix rtnh_ok() (bnc#1012382).\n- net: fix uninit-value in __hw_addr_add_ex() (bnc#1012382).\n- net: initialize skb-\u003epeeked when cloning (bnc#1012382).\n- net: metrics: add proper netlink validation (bnc#1012382).\n- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).\n- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).\n- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).\n- net: test tailroom before appending to linear skb (bnc#1012382).\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).\n- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).\n- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (bnc#1012382).\n- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).\n- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).\n- netlink: fix uninit-value in netlink_sendmsg (bnc#1012382).\n- nfit, address-range-scrub: fix scrub in-progress reporting\n- nfit: fix region registration vs block-data-window ranges\n- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).\n- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).\n- nvme-pci: Fix EEH failure on ppc (bsc#1093533).\n- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).\n- nvme: target: fix buffer overflow (bsc#993388).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bnc#1012382).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).\n- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1070404).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).\n- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).\n- packet: fix bitfield update race (bnc#1012382).\n- packet: fix reserve calculation (bnc#1012382 git-fixes).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (bnc#1012382).\n- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).\n- parisc: Fix out of array access in match_pci_device() (bnc#1012382).\n- percpu: include linux/sched.h for cond_resched() (bnc#1012382).\n- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).\n- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).\n- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).\n- perf intel-pt: Fix sync_switch (bnc#1012382).\n- perf intel-pt: Fix timestamp following overflow (bnc#1012382).\n- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).\n- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).\n- perf/cgroup: Fix child event counting bug (bnc#1012382).\n- perf/core: Fix perf_output_read_group() (bnc#1012382).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages[] (bnc#1012382).\n- perf/core: Fix the perf_cpu_time_max_percent check (bnc#1012382).\n- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bnc#1012382).\n- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bnc#1012382).\n- perf: Remove superfluous allocation error check (bnc#1012382).\n- perf: Return proper values for user stack errors (bnc#1012382).\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Clear PCR on boot (bnc#1012382).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).\n- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).\n- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).\n- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).\n- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).\n- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).\n- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).\n- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).\n- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). \n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- powerpc: conditionally compile platform-specific serial drivers (bsc#1066223).\n- powerpc: signals: Discard transaction state from signal frames (bsc#1094059).\n- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).\n- proc read mm\u0027s {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).\n- proc: fix /proc/*/map_files lookup (bnc#1012382).\n- proc: meminfo: estimate available memory more conservatively (-- VM bnc#1012382 functionality monitoring space user).\n- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).\n- qed: Fix LL2 race during connection terminate (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix mask for physical address in ILT entry (bnc#1012382).\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: LL2 flush isles when connection is closed (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Fix ref-cnt usage count (bsc#1019695 bsc#1019699 bsc#1022604).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).\n- r8152: add Linksys USB3GIGV1 id (bnc#1012382).\n- r8152: fix tx packets accounting (bnc#1012382).\n- r8169: fix powering up RTL8168h (bnc#1012382).\n- radeon: hide pointless #warning when compile testing (bnc#1012382).\n- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bnc#1012382).\n- regulatory: add NUL to request alpha2 (bnc#1012382).\n- resource: fix integer overflow at reallocation (bnc#1012382).\n- rfkill: gpio: fix memory leak in probe error path (bnc#1012382).\n- rpc_pipefs: fix double-dput() (bnc#1012382).\n- rpm/config.sh: build against SP3 in OBS as well.\n- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bnc#1012382).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).\n- rtnetlink: validate attributes in do_setlink() (bnc#1012382).\n- s390/alternative: use a copy of the facility bit mask (bnc#1012382).\n- s390/cio: clear timer when terminating driver I/O (bnc#1012382).\n- s390/cio: fix return code after missing interrupt (bnc#1012382).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero ( bnc#1012382 bnc#1094532).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1094532, ).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093144, ).\n- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).\n- s390/ftrace: use expoline for indirect branches (bnc#1012382).\n- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).\n- s390/kernel: use expoline for indirect branches (bnc#1012382).\n- s390/lib: use expoline for indirect branches (bnc#1012382).\n- s390/qdio: do not merge ERROR output buffers (bnc#1012382).\n- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).\n- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).\n- s390/qdio: fix access to uninitialized qdio_q fields ( bnc#1012382 bnc#1094532).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1094532, ).\n- s390/qeth: consolidate errno translation (bnc#1093144, ).\n- s390/qeth: fix MAC address update sequence (bnc#1093144, ).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, ).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).\n- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).\n- s390: add assembler macros for CPU alternatives (bnc#1012382).\n- s390: add automatic detection of the spectre defense (bnc#1012382).\n- s390: add optimized array_index_mask_nospec (bnc#1012382).\n- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).\n- s390: add sysfs attributes for spectre (bnc#1012382).\n- s390: correct module section names for expoline code revert (bnc#1012382).\n- s390: correct nospec auto detection init order (bnc#1012382).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).\n- s390: enable CPU alternatives unconditionally (bnc#1012382).\n- s390: extend expoline to BC instructions (bnc#1012382).\n- s390: introduce execute-trampolines for branches (bnc#1012382).\n- s390: move expoline assembler macros to a header (bnc#1012382).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).\n- s390: move spectre sysfs attribute code (bnc#1012382).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).\n- s390: report spectre mitigation via syslog (bnc#1012382).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).\n- s390: use expoline thunks in the BPF JIT (bnc#1012382).\n- sched/rt: Fix rq-\u003eclock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).\n- scsi: aacraid: Correct hba_send to include iu_type (bsc#1022607).\n- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).\n- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).\n- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).\n- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).\n- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).\n- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).\n- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).\n- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).\n- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).\n- scsi: mptsas: Disable WRITE SAME (bnc#1012382).\n- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).\n- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).\n- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).\n- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).\n- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).\n- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).\n- scsi: zfcp: fix infinite iteration on ERP ready list ( bnc#1012382 bnc#1094532).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1094532, ).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).\n- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (bnc#1012382).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).\n- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).\n- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).\n- selftests: Print the test we\u0027re running to /dev/kmsg (bnc#1012382).\n- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).\n- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).\n- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).\n- selftests: memfd: add config fragment for fuse (bnc#1012382).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: mctrl_gpio: Add missing module license (bnc#1012382).\n- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).\n- sh: New gcc support (bnc#1012382).\n- sh: fix debug trap failure to process signals before return to user (bnc#1012382).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (-- Scheduler bnc#1012382 bnc#978907 performance signals).\n- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).\n- slip: Check if rstate is initialized before uncompressing (bnc#1012382).\n- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).\n- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).\n- soreuseport: initialise timewait reuseport field (bnc#1012382).\n- sparc64: Fix build warnings with gcc 7 (bnc#1012382).\n- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).\n- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).\n- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).\n- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bnc#1012382).\n- stm class: Use vmalloc for the master map (bnc#1012382).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).\n- sunvnet: does not support GSO for sctp (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: do not read out-of-bounds opsize (bnc#1012382).\n- tcp: fix TCP_REPAIR_QUEUE bound checking (bnc#1012382).\n- tcp: ignore Fast Open on repair mode (bnc#1012382).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).\n- tcp: purge write queue in tcp_connect_init() (bnc#1012382).\n- team: avoid adding twice the same option to the event list (bnc#1012382).\n- team: fix netconsole setup over team (bnc#1012382).\n- team: use netdev_features_t instead of u32 (bnc#1012382).\n- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).\n- test_firmware: fix setting old custom fw path back on exit, second try (bnc#1012382).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).\n- there is probably a place where forcing _IBRS_OFF is missed (or is too late) and therefore ENABLE_IBRS is sometimes called early during boot while it should not. Let\u0027s drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012\n- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).\n- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).\n- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).\n- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).\n- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).\n- tools/thermal: tmon: fix for segfault (bnc#1012382).\n- tpm: do not suspend/resume if power stays on (bnc#1012382).\n- tpm: self test failure should not cause suspend to fail (bnc#1012382).\n- tracepoint: Do not warn on ENOMEM (bnc#1012382).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).\n- tracing/uprobe_event: Fix strncpy corner case (bnc#1012382).\n- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).\n- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).\n- tracing: Fix regex_match_front() to not over compare the test string (bnc#1012382).\n- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).\n- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bnc#1012382).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).\n- ubi: Fix error for write access (bnc#1012382).\n- ubi: Reject MLC NAND (bnc#1012382).\n- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).\n- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).\n- udf: Provide saner default for invalid uid / gid (bnc#1012382).\n- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).\n- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).\n- usb: dwc2: Fix interval type issue (bnc#1012382).\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).\n- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).\n- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).\n- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).\n- usb: musb: fix enumeration after resume (bnc#1012382).\n- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).\n- usb: musb: host: fix potential NULL pointer dereference (bnc#1012382).\n- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).\n- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).\n- vfio-pci: Virtualize PCIe and AF FLR (bnc#1012382).\n- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).\n- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).\n- vfs: add path_has_submounts() (bsc#1086716).\n- vfs: add path_is_mountpoint() helper (bsc#1086716).\n- vfs: change d_manage() to take a struct path (bsc#1086716).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).\n- virtio: add ability to iterate over vqs (bnc#1012382).\n- virtio_console: free buffers after reset (bnc#1012382).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (bnc#1012382).\n- vmscan: do not force-scan file lru if its absolute size is small (-- VM bnc#1012382 page performance reclaim).\n- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).\n- vti4: Do not count header length twice on tunnel setup (bnc#1012382).\n- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).\n- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).\n- watchdog: hpwdt: Modify to use watchdog core (bsc#1085185).\n- watchdog: hpwdt: Update Module info and copyright (bsc#1085185).\n- watchdog: hpwdt: Update nmi_panic message (bsc#1085185).\n- watchdog: hpwdt: condition early return of NMI handler on iLO5 (bsc#1085185).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).\n- workqueue: use put_device() instead of kfree() (bnc#1012382).\n- writeback: safer lock nesting (bnc#1012382).\n- x86/apic: Set up through-local-APIC mode on the boot CPU if \u0027noapic\u0027 specified (bnc#1012382).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/bugs: Respect retpoline command line option (bsc#1068032).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).\n- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).\n- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).\n- x86/devicetree: Initialize device tree before using it (bnc#1012382).\n- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).\n- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).\n- x86/fpu: Revert (\u0027x86/fpu: Disable AVX when eagerfpu is off\u0027) (bnc#1012382).\n- x86/hweight: Do not clobber %rdi (bnc#1012382).\n- x86/hweight: Get rid of the special calling convention (bnc#1012382).\n- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).\n- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).\n- x86/pkeys: Do not special case protection key 0 (1041740).\n- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).\n- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263).\n- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).\n- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263).\n- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263).\n- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263\n- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263).\n- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263).\n- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).\n- x86/topology: Update the \u0027cpu cores\u0027 field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).\n- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xen-netfront: Fix race between device setup and open (bnc#1012382).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).\n- xen/acpi: off by one in read_acpi_id() (bnc#1012382).\n- xen/grant-table: Use put_page instead of free_page (bnc#1012382).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).\n- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).\n- xfrm_user: fix return value from xfrm_user_rcv_msg (bnc#1012382).\n- xfs: always verify the log tail during recovery (bsc#1036215).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: fix endianness error when checking log block crc on big endian platforms (bsc#1094405, bsc#1036215).\n- xfs: fix incorrect log_flushed on fsync (bnc#1012382).\n- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).\n- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).\n- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bnc#1012382).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).\n- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).\n- zorro: Set up z-\u003edev.dma_mask for the DMA API (bnc#1012382).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RT-12-SP3-2018-1224",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1816-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1816-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1816-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html"
},
{
"category": "self",
"summary": "SUSE Bug 1009062",
"url": "https://bugzilla.suse.com/1009062"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1019695",
"url": "https://bugzilla.suse.com/1019695"
},
{
"category": "self",
"summary": "SUSE Bug 1019699",
"url": "https://bugzilla.suse.com/1019699"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1022607",
"url": "https://bugzilla.suse.com/1022607"
},
{
"category": "self",
"summary": "SUSE Bug 1022743",
"url": "https://bugzilla.suse.com/1022743"
},
{
"category": "self",
"summary": "SUSE Bug 1024718",
"url": "https://bugzilla.suse.com/1024718"
},
{
"category": "self",
"summary": "SUSE Bug 1031717",
"url": "https://bugzilla.suse.com/1031717"
},
{
"category": "self",
"summary": "SUSE Bug 1035432",
"url": "https://bugzilla.suse.com/1035432"
},
{
"category": "self",
"summary": "SUSE Bug 1036215",
"url": "https://bugzilla.suse.com/1036215"
},
{
"category": "self",
"summary": "SUSE Bug 1041740",
"url": "https://bugzilla.suse.com/1041740"
},
{
"category": "self",
"summary": "SUSE Bug 1043598",
"url": "https://bugzilla.suse.com/1043598"
},
{
"category": "self",
"summary": "SUSE Bug 1044596",
"url": "https://bugzilla.suse.com/1044596"
},
{
"category": "self",
"summary": "SUSE Bug 1045330",
"url": "https://bugzilla.suse.com/1045330"
},
{
"category": "self",
"summary": "SUSE Bug 1056415",
"url": "https://bugzilla.suse.com/1056415"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1060799",
"url": "https://bugzilla.suse.com/1060799"
},
{
"category": "self",
"summary": "SUSE Bug 1066223",
"url": "https://bugzilla.suse.com/1066223"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068054",
"url": "https://bugzilla.suse.com/1068054"
},
{
"category": "self",
"summary": "SUSE Bug 1068951",
"url": "https://bugzilla.suse.com/1068951"
},
{
"category": "self",
"summary": "SUSE Bug 1070404",
"url": "https://bugzilla.suse.com/1070404"
},
{
"category": "self",
"summary": "SUSE Bug 1073059",
"url": "https://bugzilla.suse.com/1073059"
},
{
"category": "self",
"summary": "SUSE Bug 1073311",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075428",
"url": "https://bugzilla.suse.com/1075428"
},
{
"category": "self",
"summary": "SUSE Bug 1076049",
"url": "https://bugzilla.suse.com/1076049"
},
{
"category": "self",
"summary": "SUSE Bug 1076263",
"url": "https://bugzilla.suse.com/1076263"
},
{
"category": "self",
"summary": "SUSE Bug 1076805",
"url": "https://bugzilla.suse.com/1076805"
},
{
"category": "self",
"summary": "SUSE Bug 1078583",
"url": "https://bugzilla.suse.com/1078583"
},
{
"category": "self",
"summary": "SUSE Bug 1079152",
"url": "https://bugzilla.suse.com/1079152"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1080542",
"url": "https://bugzilla.suse.com/1080542"
},
{
"category": "self",
"summary": "SUSE Bug 1080656",
"url": "https://bugzilla.suse.com/1080656"
},
{
"category": "self",
"summary": "SUSE Bug 1081500",
"url": "https://bugzilla.suse.com/1081500"
},
{
"category": "self",
"summary": "SUSE Bug 1081514",
"url": "https://bugzilla.suse.com/1081514"
},
{
"category": "self",
"summary": "SUSE Bug 1081599",
"url": "https://bugzilla.suse.com/1081599"
},
{
"category": "self",
"summary": "SUSE Bug 1082153",
"url": "https://bugzilla.suse.com/1082153"
},
{
"category": "self",
"summary": "SUSE Bug 1082299",
"url": "https://bugzilla.suse.com/1082299"
},
{
"category": "self",
"summary": "SUSE Bug 1082485",
"url": "https://bugzilla.suse.com/1082485"
},
{
"category": "self",
"summary": "SUSE Bug 1082504",
"url": "https://bugzilla.suse.com/1082504"
},
{
"category": "self",
"summary": "SUSE Bug 1082962",
"url": "https://bugzilla.suse.com/1082962"
},
{
"category": "self",
"summary": "SUSE Bug 1082979",
"url": "https://bugzilla.suse.com/1082979"
},
{
"category": "self",
"summary": "SUSE Bug 1083635",
"url": "https://bugzilla.suse.com/1083635"
},
{
"category": "self",
"summary": "SUSE Bug 1083650",
"url": "https://bugzilla.suse.com/1083650"
},
{
"category": "self",
"summary": "SUSE Bug 1083900",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "self",
"summary": "SUSE Bug 1084721",
"url": "https://bugzilla.suse.com/1084721"
},
{
"category": "self",
"summary": "SUSE Bug 1085185",
"url": "https://bugzilla.suse.com/1085185"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1086400",
"url": "https://bugzilla.suse.com/1086400"
},
{
"category": "self",
"summary": "SUSE Bug 1086716",
"url": "https://bugzilla.suse.com/1086716"
},
{
"category": "self",
"summary": "SUSE Bug 1087007",
"url": "https://bugzilla.suse.com/1087007"
},
{
"category": "self",
"summary": "SUSE Bug 1087012",
"url": "https://bugzilla.suse.com/1087012"
},
{
"category": "self",
"summary": "SUSE Bug 1087036",
"url": "https://bugzilla.suse.com/1087036"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087086",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "self",
"summary": "SUSE Bug 1087095",
"url": "https://bugzilla.suse.com/1087095"
},
{
"category": "self",
"summary": "SUSE Bug 1088810",
"url": "https://bugzilla.suse.com/1088810"
},
{
"category": "self",
"summary": "SUSE Bug 1088871",
"url": "https://bugzilla.suse.com/1088871"
},
{
"category": "self",
"summary": "SUSE Bug 1089023",
"url": "https://bugzilla.suse.com/1089023"
},
{
"category": "self",
"summary": "SUSE Bug 1089115",
"url": "https://bugzilla.suse.com/1089115"
},
{
"category": "self",
"summary": "SUSE Bug 1089393",
"url": "https://bugzilla.suse.com/1089393"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1090225",
"url": "https://bugzilla.suse.com/1090225"
},
{
"category": "self",
"summary": "SUSE Bug 1090435",
"url": "https://bugzilla.suse.com/1090435"
},
{
"category": "self",
"summary": "SUSE Bug 1090534",
"url": "https://bugzilla.suse.com/1090534"
},
{
"category": "self",
"summary": "SUSE Bug 1090643",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "self",
"summary": "SUSE Bug 1090658",
"url": "https://bugzilla.suse.com/1090658"
},
{
"category": "self",
"summary": "SUSE Bug 1090663",
"url": "https://bugzilla.suse.com/1090663"
},
{
"category": "self",
"summary": "SUSE Bug 1090708",
"url": "https://bugzilla.suse.com/1090708"
},
{
"category": "self",
"summary": "SUSE Bug 1090718",
"url": "https://bugzilla.suse.com/1090718"
},
{
"category": "self",
"summary": "SUSE Bug 1090734",
"url": "https://bugzilla.suse.com/1090734"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1090955",
"url": "https://bugzilla.suse.com/1090955"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1091325",
"url": "https://bugzilla.suse.com/1091325"
},
{
"category": "self",
"summary": "SUSE Bug 1091594",
"url": "https://bugzilla.suse.com/1091594"
},
{
"category": "self",
"summary": "SUSE Bug 1091728",
"url": "https://bugzilla.suse.com/1091728"
},
{
"category": "self",
"summary": "SUSE Bug 1091960",
"url": "https://bugzilla.suse.com/1091960"
},
{
"category": "self",
"summary": "SUSE Bug 1092289",
"url": "https://bugzilla.suse.com/1092289"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1092552",
"url": "https://bugzilla.suse.com/1092552"
},
{
"category": "self",
"summary": "SUSE Bug 1092566",
"url": "https://bugzilla.suse.com/1092566"
},
{
"category": "self",
"summary": "SUSE Bug 1092772",
"url": "https://bugzilla.suse.com/1092772"
},
{
"category": "self",
"summary": "SUSE Bug 1092813",
"url": "https://bugzilla.suse.com/1092813"
},
{
"category": "self",
"summary": "SUSE Bug 1092888",
"url": "https://bugzilla.suse.com/1092888"
},
{
"category": "self",
"summary": "SUSE Bug 1092904",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "self",
"summary": "SUSE Bug 1092975",
"url": "https://bugzilla.suse.com/1092975"
},
{
"category": "self",
"summary": "SUSE Bug 1093008",
"url": "https://bugzilla.suse.com/1093008"
},
{
"category": "self",
"summary": "SUSE Bug 1093035",
"url": "https://bugzilla.suse.com/1093035"
},
{
"category": "self",
"summary": "SUSE Bug 1093144",
"url": "https://bugzilla.suse.com/1093144"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1093533",
"url": "https://bugzilla.suse.com/1093533"
},
{
"category": "self",
"summary": "SUSE Bug 1093904",
"url": "https://bugzilla.suse.com/1093904"
},
{
"category": "self",
"summary": "SUSE Bug 1093990",
"url": "https://bugzilla.suse.com/1093990"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE Bug 1094033",
"url": "https://bugzilla.suse.com/1094033"
},
{
"category": "self",
"summary": "SUSE Bug 1094059",
"url": "https://bugzilla.suse.com/1094059"
},
{
"category": "self",
"summary": "SUSE Bug 1094177",
"url": "https://bugzilla.suse.com/1094177"
},
{
"category": "self",
"summary": "SUSE Bug 1094268",
"url": "https://bugzilla.suse.com/1094268"
},
{
"category": "self",
"summary": "SUSE Bug 1094353",
"url": "https://bugzilla.suse.com/1094353"
},
{
"category": "self",
"summary": "SUSE Bug 1094356",
"url": "https://bugzilla.suse.com/1094356"
},
{
"category": "self",
"summary": "SUSE Bug 1094405",
"url": "https://bugzilla.suse.com/1094405"
},
{
"category": "self",
"summary": "SUSE Bug 1094466",
"url": "https://bugzilla.suse.com/1094466"
},
{
"category": "self",
"summary": "SUSE Bug 1094532",
"url": "https://bugzilla.suse.com/1094532"
},
{
"category": "self",
"summary": "SUSE Bug 1094823",
"url": "https://bugzilla.suse.com/1094823"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1095042",
"url": "https://bugzilla.suse.com/1095042"
},
{
"category": "self",
"summary": "SUSE Bug 1095147",
"url": "https://bugzilla.suse.com/1095147"
},
{
"category": "self",
"summary": "SUSE Bug 1096037",
"url": "https://bugzilla.suse.com/1096037"
},
{
"category": "self",
"summary": "SUSE Bug 1096140",
"url": "https://bugzilla.suse.com/1096140"
},
{
"category": "self",
"summary": "SUSE Bug 1096214",
"url": "https://bugzilla.suse.com/1096214"
},
{
"category": "self",
"summary": "SUSE Bug 1096242",
"url": "https://bugzilla.suse.com/1096242"
},
{
"category": "self",
"summary": "SUSE Bug 1096281",
"url": "https://bugzilla.suse.com/1096281"
},
{
"category": "self",
"summary": "SUSE Bug 1096751",
"url": "https://bugzilla.suse.com/1096751"
},
{
"category": "self",
"summary": "SUSE Bug 1096982",
"url": "https://bugzilla.suse.com/1096982"
},
{
"category": "self",
"summary": "SUSE Bug 1097234",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "self",
"summary": "SUSE Bug 1097356",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "self",
"summary": "SUSE Bug 1098009",
"url": "https://bugzilla.suse.com/1098009"
},
{
"category": "self",
"summary": "SUSE Bug 1098012",
"url": "https://bugzilla.suse.com/1098012"
},
{
"category": "self",
"summary": "SUSE Bug 919144",
"url": "https://bugzilla.suse.com/919144"
},
{
"category": "self",
"summary": "SUSE Bug 971975",
"url": "https://bugzilla.suse.com/971975"
},
{
"category": "self",
"summary": "SUSE Bug 973378",
"url": "https://bugzilla.suse.com/973378"
},
{
"category": "self",
"summary": "SUSE Bug 978907",
"url": "https://bugzilla.suse.com/978907"
},
{
"category": "self",
"summary": "SUSE Bug 993388",
"url": "https://bugzilla.suse.com/993388"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13305 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17741 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18241 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18241/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18249 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1065 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1092 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1093 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1094 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12233 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3665 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3665/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5803 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5848 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7492 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8781 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8781/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-06-26T11:39:16Z",
"generator": {
"date": "2018-06-26T11:39:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1816-1",
"initial_release_date": "2018-06-26T11:39:16Z",
"revision_history": [
{
"date": "2018-06-26T11:39:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.4.138-3.14.1.noarch",
"product": {
"name": "kernel-devel-rt-4.4.138-3.14.1.noarch",
"product_id": "kernel-devel-rt-4.4.138-3.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.4.138-3.14.1.noarch",
"product": {
"name": "kernel-source-rt-4.4.138-3.14.1.noarch",
"product_id": "kernel-source-rt-4.4.138-3.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"product_id": "dlm-kmp-rt-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"product_id": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "kernel-rt-4.4.138-3.14.1.x86_64",
"product_id": "kernel-rt-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.4.138-3.14.1.x86_64",
"product": {
"name": "kernel-rt-base-4.4.138-3.14.1.x86_64",
"product_id": "kernel-rt-base-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.4.138-3.14.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.4.138-3.14.1.x86_64",
"product_id": "kernel-rt-devel-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.4.138-3.14.1.x86_64",
"product_id": "kernel-syms-rt-4.4.138-3.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch"
},
"product_reference": "kernel-devel-rt-4.4.138-3.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "kernel-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64"
},
"product_reference": "kernel-rt-base-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch"
},
"product_reference": "kernel-source-rt-4.4.138-3.14.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3",
"product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13305"
}
],
"notes": [
{
"category": "general",
"text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13305",
"url": "https://www.suse.com/security/cve/CVE-2017-13305"
},
{
"category": "external",
"summary": "SUSE Bug 1094353 for CVE-2017-13305",
"url": "https://bugzilla.suse.com/1094353"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2017-13305",
"url": "https://bugzilla.suse.com/1105412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-13305"
},
{
"cve": "CVE-2017-17741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17741"
}
],
"notes": [
{
"category": "general",
"text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17741",
"url": "https://www.suse.com/security/cve/CVE-2017-17741"
},
{
"category": "external",
"summary": "SUSE Bug 1073311 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1073311"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-17741",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-17741"
},
{
"cve": "CVE-2017-18241",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18241"
}
],
"notes": [
{
"category": "general",
"text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18241",
"url": "https://www.suse.com/security/cve/CVE-2017-18241"
},
{
"category": "external",
"summary": "SUSE Bug 1086400 for CVE-2017-18241",
"url": "https://bugzilla.suse.com/1086400"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-18241"
},
{
"cve": "CVE-2017-18249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18249"
}
],
"notes": [
{
"category": "general",
"text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18249",
"url": "https://www.suse.com/security/cve/CVE-2017-18249"
},
{
"category": "external",
"summary": "SUSE Bug 1087036 for CVE-2017-18249",
"url": "https://bugzilla.suse.com/1087036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-18249"
},
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-1065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1065"
}
],
"notes": [
{
"category": "general",
"text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1065",
"url": "https://www.suse.com/security/cve/CVE-2018-1065"
},
{
"category": "external",
"summary": "SUSE Bug 1083650 for CVE-2018-1065",
"url": "https://bugzilla.suse.com/1083650"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1065",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-1065"
},
{
"cve": "CVE-2018-1092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1092"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1092",
"url": "https://www.suse.com/security/cve/CVE-2018-1092"
},
{
"category": "external",
"summary": "SUSE Bug 1087012 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087012"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-1092"
},
{
"cve": "CVE-2018-1093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1093"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1093",
"url": "https://www.suse.com/security/cve/CVE-2018-1093"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087095 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "low"
}
],
"title": "CVE-2018-1093"
},
{
"cve": "CVE-2018-1094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1094"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1094",
"url": "https://www.suse.com/security/cve/CVE-2018-1094"
},
{
"category": "external",
"summary": "SUSE Bug 1087007 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087007"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "low"
}
],
"title": "CVE-2018-1094"
},
{
"cve": "CVE-2018-1130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1130"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1130",
"url": "https://www.suse.com/security/cve/CVE-2018-1130"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2018-1130",
"url": "https://bugzilla.suse.com/1092904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "low"
}
],
"title": "CVE-2018-1130"
},
{
"cve": "CVE-2018-12233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12233"
}
],
"notes": [
{
"category": "general",
"text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12233",
"url": "https://www.suse.com/security/cve/CVE-2018-12233"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097234 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-12233"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3665",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3665"
}
],
"notes": [
{
"category": "general",
"text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3665",
"url": "https://www.suse.com/security/cve/CVE-2018-3665"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087086 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1087086"
},
{
"category": "external",
"summary": "SUSE Bug 1090338 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1090338"
},
{
"category": "external",
"summary": "SUSE Bug 1095241 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095241"
},
{
"category": "external",
"summary": "SUSE Bug 1095242 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1095242"
},
{
"category": "external",
"summary": "SUSE Bug 1096740 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1096740"
},
{
"category": "external",
"summary": "SUSE Bug 1100091 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100091"
},
{
"category": "external",
"summary": "SUSE Bug 1100555 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1100555"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3665",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-3665"
},
{
"cve": "CVE-2018-5803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5803",
"url": "https://www.suse.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "SUSE Bug 1083900 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "low"
}
],
"title": "CVE-2018-5803"
},
{
"cve": "CVE-2018-5848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5848"
}
],
"notes": [
{
"category": "general",
"text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5848",
"url": "https://www.suse.com/security/cve/CVE-2018-5848"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097356 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1115339 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1115339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-5848"
},
{
"cve": "CVE-2018-7492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7492"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7492",
"url": "https://www.suse.com/security/cve/CVE-2018-7492"
},
{
"category": "external",
"summary": "SUSE Bug 1082962 for CVE-2018-7492",
"url": "https://bugzilla.suse.com/1082962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-7492"
},
{
"cve": "CVE-2018-8781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8781"
}
],
"notes": [
{
"category": "general",
"text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8781",
"url": "https://www.suse.com/security/cve/CVE-2018-8781"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090643 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "external",
"summary": "SUSE Bug 1090646 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-26T11:39:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-8781"
}
]
}
SUSE-SU-2018:1614-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:45 - Updated: 2018-10-18 12:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\n- CVE-2018-3639: cpu: add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits pass through (bsc#1092885)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1100",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1614-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1614-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181614-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1614-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-10-18T12:45:59Z",
"generator": {
"date": "2018-10-18T12:45:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1614-2",
"initial_release_date": "2018-10-18T12:45:59Z",
"revision_history": [
{
"date": "2018-10-18T12:45:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-client-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-doc-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-2.0.0-27.42.1.x86_64",
"product": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64",
"product_id": "libvirt-nss-2.0.0-27.42.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-client-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-doc-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-2.0.0-27.42.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.42.1.x86_64"
},
"product_reference": "libvirt-nss-2.0.0-27.42.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.42.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.42.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-client-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-config-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-interface-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-libxl-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-network-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nodedev-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-nwfilter-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-secret-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-driver-storage-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-hooks-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-lxc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-qemu-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-daemon-xen-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-doc-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-lock-sanlock-2.0.0-27.42.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libvirt-nss-2.0.0-27.42.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:45:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2338-1
Vulnerability from csaf_suse - Published: 2018-08-15 15:31 - Updated: 2018-08-15 15:31Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update to ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1580",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2338-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2338-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182338-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2338-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1089343",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "self",
"summary": "SUSE Bug 1104134",
"url": "https://bugzilla.suse.com/1104134"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
}
],
"title": "Security update to ucode-intel",
"tracking": {
"current_release_date": "2018-08-15T15:31:46Z",
"generator": {
"date": "2018-08-15T15:31:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2338-1",
"initial_release_date": "2018-08-15T15:31:46Z",
"revision_history": [
{
"date": "2018-08-15T15:31:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180807-3.6.1.x86_64",
"product": {
"name": "ucode-intel-20180807-3.6.1.x86_64",
"product_id": "ucode-intel-20180807-3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
},
"product_reference": "ucode-intel-20180807-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T15:31:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T15:31:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:ucode-intel-20180807-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T15:31:46Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
}
]
}
SUSE-SU-2020:2605-1
Vulnerability from csaf_suse - Published: 2020-09-11 07:00 - Updated: 2020-09-11 07:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 realtime kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n- CVE-2020-14356: Fixed a null pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n- CVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2020-0305: Fixed a a possible use-after-free due to a race condition cdev_get(). This could lead to local escalation of privilege with System execution privileges needed (bnc#1174462).\n\nThe following non-security bugs were fixed:\n\n- af_key: pfkey_dump needs parameter validation (git-fixes).\n- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n- ACPI: kABI fixes for subsys exports (bsc#1174968).\n- ACPI / LPSS: Resume BYT/CHT I2C controllers from resume_noirq (bsc#1174968).\n- ACPI / LPSS: Use acpi_lpss_* instead of acpi_subsys_* functions for hibernate (bsc#1174968).\n- ACPI: PM: Introduce \u0027poweroff\u0027 callbacks for ACPI PM domain and LPSS (bsc#1174968).\n- ACPI: PM: Simplify and fix PM domain hibernation callbacks (bsc#1174968).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: core: pcm_iec958: fix kernel-doc (bsc#1111666).\n- ALSA: echoaduio: Drop superfluous volatile modifier (bsc#1111666).\n- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (bsc#1111666).\n- ALSA: hda: Add support for Loongson 7A1000 controller (bsc#1111666).\n- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (bsc#1111666).\n- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (bsc#1111666).\n- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda: fix snd_hda_codec_cleanup() documentation (bsc#1111666).\n- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (bsc#1111666).\n- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda - reverse the setting value in the micmute_led_set (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pci: delete repeated words in comments (bsc#1111666).\n- ALSA: seq: oss: Serialize ioctls (bsc#1111666).\n- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (bsc#1111666).\n- ALSA: usb-audio: add startech usb audio dock name (bsc#1111666).\n- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (bsc#1111666).\n- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (bsc#1111666).\n- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (bsc#1111666).\n- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (bsc#1111666).\n- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n- ALSA: usb-audio: fix spelling mistake \u0027buss\u0027 -\u003e \u0027bus\u0027 (bsc#1111666).\n- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).\n- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).\n- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb/line6: remove \u0027defined but not used\u0027 warning (bsc#1111666).\n- arm64: Add MIDR encoding for HiSilicon Taishan CPUs (bsc#1174547).\n- arm64: Add MIDR encoding for NVIDIA CPUs (bsc#1174547).\n- arm64: add sysfs vulnerability show for meltdown (bsc#1174547).\n- arm64: Add sysfs vulnerability show for spectre-v1 (bsc#1174547).\n- arm64: add sysfs vulnerability show for spectre-v2 (bsc#1174547).\n- arm64: add sysfs vulnerability show for speculative store bypass (bsc#1174547).\n- arm64: Advertise mitigation of Spectre-v2, or lack thereof (bsc#1174547).\n- arm64: Always enable spectre-v2 vulnerability detection (bsc#1174547).\n- arm64: Always enable ssb vulnerability detection (bsc#1174547).\n- arm64: backtrace: Do not bother trying to unwind the userspace stack (bsc#1175397).\n- arm64: capabilities: Add NVIDIA Denver CPU to bp_harden list (bsc#1174547).\n- arm64: capabilities: Merge duplicate Cavium erratum entries (bsc#1174547).\n- arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHE (bsc#1174547).\n- arm64: cpufeature: Enable Qualcomm Falkor/Kryo errata 1003 (bsc#1175398).\n- arm64: Do not mask out PTE_RDONLY in pte_same() (bsc#1175393).\n- arm64: enable generic CPU vulnerabilites support (bsc#1174547).\n- arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by default (bsc#1175394).\n- arm64: errata: Do not define type field twice for arm64_errata entries (bsc#1174547).\n- arm64: errata: Update stale comment (bsc#1174547).\n- arm64: Get rid of __smccc_workaround_1_hvc_* (bsc#1174547).\n- arm64: kpti: Avoid rewriting early page tables when KASLR is enabled (bsc#1174547).\n- arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on (bsc#1174547).\n- arm64: kpti: Whitelist Cortex-A CPUs that do not implement the CSV3 field (bsc#1174547).\n- arm64: kpti: Whitelist HiSilicon Taishan v110 CPUs (bsc#1174547).\n- arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 (bsc#1133021).\n- arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP work (bsc#1174547).\n- arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardening (bsc#1174547).\n- arm64: mm: Fix pte_mkclean, pte_mkdirty semantics (bsc#1175526).\n- arm64: Provide a command line to disable spectre_v2 mitigation (bsc#1174547).\n- arm64: Silence clang warning on mismatched value/register sizes (bsc#1175396).\n- arm64/speculation: Support \u0027mitigations=\u0027 cmdline option (bsc#1174547).\n- arm64: ssbd: explicitly depend on \u0026lt;linux/prctl.h\u003e (bsc#1175399).\n- arm64: ssbs: Do not treat CPUs with SSBS as unaffected by SSB (bsc#1174547).\n- arm64: ssbs: Fix context-switch when SSBS is present on all CPUs (bsc#1175669).\n- arm64/sve: \u0026lt;uapi/asm/ptrace.h\u003e should not depend on \u0026lt;uapi/linux/prctl.h\u003e (bsc#1175401).\n- arm64/sve: Fix wrong free for task-\u003ethread.sve_state (bsc#1175400).\n- arm64: tlbflush: avoid writing RES0 bits (bsc#1175402).\n- arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 (bsc#1174547).\n- ARM: KVM: invalidate BTB on guest exit for Cortex-A12/A17 (bsc#1133021).\n- ARM: KVM: invalidate icache on guest exit for Cortex-A15 (bsc#1133021).\n- ARM: spectre-v2: KVM: invalidate icache on guest exit for Brahma B15 (bsc#1133021).\n- ASoC: hda/tegra: Set buffer alignment to 128 bytes (bsc#1111666).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Remove uninitialized_var() usage (git-fixes).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (bsc#1111666).\n- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (bsc#1111666).\n- bonding: fix active-backup failover for current ARP slave (bsc#1174771).\n- bonding: fix a potential double-unregister (git-fixes).\n- bonding: show saner speed for broadcast mode (git-fixes).\n- bpf: Fix map leak in HASH_OF_MAPS map (git-fixes).\n- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (bsc#1111666).\n- brcmfmac: set state of hanger slot to FREE when flushing PSQ (bsc#1111666).\n- brcmfmac: To fix Bss Info flag definition Bug (bsc#1111666).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n- btrfs: fix block group leak when removing fails (bsc#1175149).\n- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).\n- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n- btrfs: fix race between block group removal and block group creation (bsc#1175149).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: Open code btrfs_write_and_wait_marked_extents (bsc#1175149).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Rename and export clear_btree_io_tree (bsc#1175149).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- cfg80211: check vendor command doit pointer before use (git-fixes).\n- cifs: document and cleanup dfs mount (bsc#1144333 bsc#1172428).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1144333 bsc#1172428).\n- cifs: fix double free error on share and prefix (bsc#1144333 bsc#1172428).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1144333 bsc#1172428).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1144333 bsc#1172428).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1144333 bsc#1172428).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1144333 bsc#1172428).\n- cifs: rename reconn_inval_dfs_target() (bsc#1144333 bsc#1172428).\n- clk: at91: clk-generated: check best_rate against ranges (bsc#1111666).\n- clk: clk-atlas6: fix return value check in atlas6_clk_init() (bsc#1111666).\n- clk: iproc: round clock rate to the closest (bsc#1111666).\n- clk: spear: Remove uninitialized_var() usage (git-fixes).\n- clk: st: Remove uninitialized_var() usage (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- console: newport_con: fix an issue about leak related system resources (git-fixes).\n- crypto: ccp - Fix use of merged scatterlists (git-fixes).\n- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dev: Defer free of skbs in flush_backlog (git-fixes).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- devres: keep both device name and resource name in pretty name (git-fixes).\n- dlm: Fix kobject memleak (bsc#1175768).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- Documentation/networking: Add net DIM documentation (bsc#1174852).\n- dpaa2-eth: Fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1175403).\n- dpaa2-eth: free already allocated channels on probe defer (bsc#1175404).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (bsc#1175405).\n- dpaa_eth: add dropped frames to percpu ethtool stats (bsc#1174550).\n- dpaa_eth: add newline in dev_err() msg (bsc#1174550).\n- dpaa_eth: avoid timestamp read on error paths (bsc#1175406).\n- dpaa_eth: change DMA device (bsc#1174550).\n- dpaa_eth: cleanup skb_to_contig_fd() (bsc#1174550).\n- dpaa_eth: defer probing after qbman (bsc#1174550).\n- dpaa_eth: extend delays in ndo_stop (bsc#1174550).\n- dpaa_eth: fix DMA mapping leak (bsc#1174550).\n- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1174550).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174550).\n- dpaa_eth: perform DMA unmapping before read (bsc#1175407).\n- dpaa_eth: register a device link for the qman portal used (bsc#1174550).\n- dpaa_eth: remove netdev_err() for user errors (bsc#1174550).\n- dpaa_eth: remove redundant code (bsc#1174550).\n- dpaa_eth: simplify variables used in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use a page to store the SGT (bsc#1174550).\n- dpaa_eth: use fd information in dpaa_cleanup_tx_fd() (bsc#1174550).\n- dpaa_eth: use only one buffer pool per interface (bsc#1174550).\n- dpaa_eth: use page backed rx buffers (bsc#1174550).\n- driver core: Avoid binding drivers to dead devices (git-fixes).\n- Drivers: hv: vmbus: Fix virt_to_hvpfn() for X86_PAE (git-fixes).\n- Drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175127, bsc#1175128).\n- drivers/perf: hisi: Fix typo in events attribute array (bsc#1175408).\n- drivers/perf: hisi: Fixup one DDRC PMU register offset (bsc#1175410).\n- drivers/perf: hisi: Fix wrong value for all counters enable (bsc#1175409).\n- drm: Added orientation quirk for ASUS tablet model T103HAF (bsc#1111666).\n- drm/amdgpu: avoid dereferencing a NULL pointer (bsc#1111666).\n- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (bsc#1111666).\n- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (bsc#1113956)\n- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1113956)\n- drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1113956)\n- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1113956)\n- drm/debugfs: fix plain echo to connector \u0027force\u0027 attribute (bsc#1111666).\n- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (bsc#1111666).\n- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (bsc#1112178)\n- drm: hold gem reference until object is no longer accessed (bsc#1113956)\n- drm/imx: fix use after free (git-fixes).\n- drm/imx: imx-ldb: Disable both channels for split mode in enc-\u003edisable() (git-fixes).\n- drm/imx: tve: fix regulator_disable error path (git-fixes).\n- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n- drm/msm: ratelimit crtc event overflow error (bsc#1111666).\n- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n- drm/nouveau: fix multiple instances of reference count leaks (bsc#1111666).\n- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n- drm/radeon: disable AGP by default (bsc#1111666).\n- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (bsc#1111666).\n- drm/rockchip: fix VOP_WIN_GET macro (bsc#1175411).\n- drm/tilcdc: fix leak \u0026 null ref in panel_connector_get_modes (bsc#1111666).\n- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (bsc#1175232).\n- drm/vmwgfx: Fix two list_for_each loop exit tests (bsc#1111666).\n- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (bsc#1111666).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- ext4: check journal inode extents more carefully (bsc#1173485).\n- ext4: do not allow overlapping system zones (bsc#1173485).\n- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fbdev: Detect integer underflow at \u0027struct fbcon_ops\u0027-\u003eclear_margins. (bsc#1112178)\n- firmware: google: check if size is valid when decoding VPD data (git-fixes).\n- firmware: google: increment VPD key_len properly (git-fixes).\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fsl/fman: add API to get the device behind a fman port (bsc#1174550).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174550).\n- fsl/fman: do not touch liodn base regs reserved on non-PAMU SoCs (bsc#1174550).\n- fsl/fman: remove unused struct member (bsc#1174550).\n- fuse: fix memleak in cuse_channel_open (bsc#1174926).\n- fuse: fix missing unlock_page in fuse_writepage() (bsc#1174904).\n- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175062).\n- fuse: fix weird page warning (bsc#1175063).\n- fuse: flush dirty data/metadata before non-truncate setattr (bsc#1175064).\n- fuse: truncate pending writes on O_TRUNC (bsc#1175065).\n- fuse: verify attributes (bsc#1175066).\n- fuse: verify nlink (bsc#1175067).\n- genetlink: remove genl_bind (networking-stable-20_07_17).\n- go7007: add sanity checking for endpoints (git-fixes).\n- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_netvsc: Fix error handling in netvsc_attach() (git-fixes).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hv_netvsc: Fix unwanted wakeup in netvsc_attach() (git-fixes).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: rcar: slave: only send STOP event when we have been addressed (bsc#1111666).\n- i40e: Fix crash during removing i40e driver (git-fixes).\n- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).\n- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n- include/linux/poison.h: remove obsolete comment (git fixes (poison)).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: sentelic - fix error return when fsp_reg_write fails (bsc#1111666).\n- integrity: remove redundant initialization of variable ret (git-fixes).\n- io-mapping: indicate mapping failure (git-fixes).\n- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).\n- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: Emit events for post-register MTU changes (git-fixes).\n- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).\n- ip_tunnel: restore binding to ifaces with a large mtu (git-fixes).\n- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).\n- ipv4: Silence suspicious RCU usage warning (git-fixes).\n- ipv6: fix memory leaks on IPV6_ADDRFORM path (git-fixes).\n- ipvlan: fix device features (git-fixes).\n- ipvs: allow connection reuse for unconfirmed conntrack (git-fixes).\n- ipvs: fix refcount usage for conns in ops mode (git-fixes).\n- ipvs: fix the connection sync failed in some cases (bsc#1174699).\n- irqchip/gic: Atomically update affinity (bsc#1111666).\n- iwlegacy: Check the return value of pcie_capability_read_*() (bsc#1111666).\n- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).\n- kABI: genetlink: remove genl_bind (kabi).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).\n- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).\n- KVM: arm64: Ensure \u0027params\u0027 is initialised when looking up sys register (bsc#1133021).\n- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).\n- KVM: arm/arm64: Fix young bit from mmu notifier (bsc#1133021).\n- KVM: arm/arm64: vgic: Do not rely on the wrong pending table (bsc#1133021).\n- KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections (bsc#1133021).\n- KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests (bsc#1133021).\n- KVM: arm: Make inject_abt32() inject an external abort instead (bsc#1133021).\n- kvm: Change offset in kvm_write_guest_offset_cached to unsigned (bsc#1133021).\n- KVM: Check for a bad hva before dropping into the ghc slow path (bsc#1133021).\n- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).\n- leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n- leds: core: Flush scheduled work for system suspend (git-fixes).\n- leds: da903x: fix use-after-free on unbind (git-fixes).\n- leds: lm3533: fix use-after-free on unbind (git-fixes).\n- leds: lm355x: avoid enum conversion warning (git-fixes).\n- leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1174852).\n- lib: dimlib: fix help text typos (bsc#1174852).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- linux/dim: Add completions count to dim_sample (bsc#1174852).\n- linux/dim: Fix overflow in dim calculation (bsc#1174852).\n- linux/dim: Move implementation to .c files (bsc#1174852).\n- linux/dim: Move logic to dim.h (bsc#1174852).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1174852).\n- linux/dim: Rename externally exposed macros (bsc#1174852).\n- linux/dim: Rename externally used net_dim members (bsc#1174852).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1174852).\n- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).\n- mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n- MAINTAINERS: add entry for Dynamic Interrupt Moderation (bsc#1174852).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).\n- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n- media: firewire: Using uninitialized values in node_probe() (git-fixes).\n- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n- mfd: dln2: Run event handler loop under spinlock (git-fixes).\n- mfd: rk808: Fix RK818 ID template (bsc#1175412).\n- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mm: filemap: clear idle flag for writes (bsc#1175769).\n- mm/migrate.c: add missing flush_dcache_page for non-mapped page migrate (git fixes (mm/migrate)).\n- mm/mmu_notifier: use hlist_add_head_rcu() (git fixes (mm/mmu_notifiers)).\n- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git fixes (mm/rmap)).\n- mm/shmem.c: cast the type of unmap_start to u64 (git fixes (mm/shmem)).\n- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).\n- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).\n- mtd: spi-nor: Fix an error code in spi_nor_read_raw() (bsc#1175413).\n- mtd: spi-nor: fix kernel-doc for spi_nor::info (bsc#1175414).\n- mtd: spi-nor: fix kernel-doc for spi_nor::reg_proto (bsc#1175415).\n- mtd: spi-nor: fix silent truncation in spi_nor_read_raw() (bsc#1175416).\n- mwifiex: Prevent memory corruption handling keys (git-fixes).\n- net: Added pointer check for dst-\u003eops-\u003eneigh_lookup in dst_neigh_lookup_skb (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net: core: reduce recursion limit value (networking-stable-20_06_28).\n- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).\n- net: dsa: b53: check for timeout (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: ena: Add first_interrupt field to napi struct (bsc#1174852).\n- net: ena: add reserved PCI device ID (bsc#1174852).\n- net: ena: add support for reporting of packet drops (bsc#1174852).\n- net: ena: add support for the rx offset feature (bsc#1174852).\n- net: ena: add support for traffic mirroring (bsc#1174852).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n- net: ena: allow setting the hash function without changing the key (bsc#1174852).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1174852).\n- net: ena: changes to RSS hash key allocation (bsc#1174852).\n- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1174852).\n- net: ena: clean up indentation issue (bsc#1174852).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n- net: ena: cosmetic: code reorderings (bsc#1174852).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n- net: ena: cosmetic: fix line break issues (bsc#1174852).\n- net: ena: cosmetic: fix spacing issues (bsc#1174852).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n- net: ena: cosmetic: minor code changes (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n- net: ena: drop superfluous prototype (bsc#1174852).\n- net: ena: enable support of rss hash key and function changes (bsc#1174852).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1174852).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n- net: ena: ethtool: get_channels: use combined only (bsc#1174852).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n- net: ena: ethtool: support set_channels callback (bsc#1174852).\n- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1174852).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1174852).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n- net: ena: fix update of interrupt moderation register (bsc#1174852).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n- net: ena: implement XDP drop support (bsc#1174852).\n- net: ena: Implement XDP_TX action (bsc#1174852).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1174852).\n- net: ena: Make missed_tx stat incremental (bsc#1083548).\n- net: ena: Make some functions static (bsc#1174852).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n- net: ena: multiple queue creation related cleanups (bsc#1174852).\n- net: ena: Prevent reset after device destruction (bsc#1083548).\n- net: ena: reduce driver load time (bsc#1174852).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1174852).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1174852).\n- net: ena: remove code that does nothing (bsc#1174852).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1174852).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1174852).\n- net: ena: remove redundant print of number of queues (bsc#1174852).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1174852).\n- net: ena: remove set but not used variable \u0027rx_ring\u0027 (bsc#1174852).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1174852).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n- net: ena: support new LLQ acceleration mode (bsc#1174852).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1174852).\n- net: ena: use explicit variable size for clarity (bsc#1174852).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1174852).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1174852).\n- net: ethernet: broadcom: have drivers select DIMLIB as needed (bsc#1174852).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: fec: correct the error path for regulator disable in probe (git-fixes).\n- netfilter: x_tables: add counters allocation wrapper (git-fixes).\n- netfilter: x_tables: cap allocations at 512 mbyte (git-fixes).\n- netfilter: x_tables: limit allocation requests for blob rule heads (git-fixes).\n- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes).\n- net: fix memleak in register_netdevice() (networking-stable-20_06_28).\n- net: Fix the arp error in some cases (networking-stable-20_06_28).\n- net: gre: recompute gre csum for sctp over gre tunnels (git-fixes).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).\n- net: ip6_gre: Request headroom in __gre6_xmit() (git-fixes).\n- net: lan78xx: add missing endpoint sanity check (git-fixes).\n- net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n- net: make symbol \u0027flush_works\u0027 static (git-fixes).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net: netsec: Fix signedness bug in netsec_probe() (bsc#1175417).\n- net: netsec: initialize tx ring on ndo_open (bsc#1175418).\n- net: phy: Check harder for errors in get_phy_id() (bsc#1111666).\n- net: Set fput_needed iff FDPUT_FPUT is set (git-fixes).\n- net: socionext: Fix a signedness bug in ave_probe() (bsc#1175419).\n- net: socionext: replace napi_alloc_frag with the netdev variant on init (bsc#1175420).\n- net: stmmac: dwmac1000: provide multicast filter fallback (git-fixes).\n- net: udp: Fix wrong clean up for IS_UDPLITE macro (git-fixes).\n- net: update net_dim documentation after rename (bsc#1174852).\n- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).\n- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n- NTB: Fix an error in get link status (git-fixes).\n- ntb_netdev: fix sleep time mismatch (git-fixes).\n- NTB: ntb_transport: Use scnprintf() for avoiding potential buffer overflow (git-fixes).\n- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).\n- nvme: fix possible deadlock when I/O is blocked (git-fixes).\n- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).\n- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).\n- nvme-multipath: round-robin: eliminate \u0027fallback\u0027 variable (bsc#1172108).\n- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).\n- ocfs2: add trimfs dlm lock resource (bsc#1175228).\n- ocfs2: add trimfs lock to avoid duplicated trims in cluster (bsc#1175228).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: change slot number type s16 to u16 (bsc#1175786).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n- ocfs2: fix the application IO timeout when fstrim is running (bsc#1175228).\n- ocfs2: fix value of OCFS2_INVALID_SLOT (bsc#1175767).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- omapfb: dss: Fix max fclk divider for omap36xx (bsc#1113956)\n- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI/ASPM: Add missing newline in sysfs \u0027policy\u0027 (git-fixes).\n- PCI: dwc: Move interrupt acking into the proper callback (bsc#1175666).\n- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, bsc#1172872, git-fixes).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n- pinctrl: single: fix function name in documentation (git-fixes).\n- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n- PM / CPU: replace raw_notifier with atomic_notifier (git fixes (kernel/pm)).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (bsc#1175668).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails.\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (bsc#1175668).\n- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).\n- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).\n- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).\n- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).\n- powerpc/pseries: PCIE PHB reset (bsc#1174689).\n- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- pseries: Fix 64 bit logical memory block panic (bsc#1065729).\n- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n- rds: Prevent kernel-infoleak in rds_notify_queue_get() (git-fixes).\n- regulator: gpio: Honor regulator-boot-on property (git-fixes).\n- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).\n- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390, dcssblk: kaddr and pfn can be NULL to -\u003edirect_access() (bsc#1174873).\n- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).\n- scsi: smartpqi: add bay identifier (bsc#1172418).\n- scsi: smartpqi: add gigabyte controller (bsc#1172418).\n- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).\n- scsi: smartpqi: add inquiry timeouts (bsc#1172418).\n- scsi: smartpqi: add module param for exposure order (bsc#1172418).\n- scsi: smartpqi: add module param to hide vsep (bsc#1172418).\n- scsi: smartpqi: add new pci ids (bsc#1172418).\n- scsi: smartpqi: add pci ids for fiberhome controller (bsc#1172418).\n- scsi: smartpqi: add RAID bypass counter (bsc#1172418).\n- scsi: smartpqi: add sysfs entries (bsc#1172418).\n- scsi: smartpqi: Align driver syntax with oob (bsc#1172418).\n- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version (bsc#1172418).\n- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).\n- scsi: smartpqi: change TMF timeout from 60 to 30 seconds (bsc#1172418).\n- scsi: smartpqi: correct hang when deleting 32 lds (bsc#1172418).\n- scsi: smartpqi: correct REGNEWD return status (bsc#1172418).\n- scsi: smartpqi: correct syntax issue (bsc#1172418).\n- scsi: smartpqi: fix call trace in device discovery (bsc#1172418).\n- scsi: smartpqi: fix controller lockup observed during force reboot (bsc#1172418).\n- scsi: smartpqi: fix LUN reset when fw bkgnd thread is hung (bsc#1172418).\n- scsi: smartpqi: fix problem with unique ID for physical device (bsc#1172418).\n- scsi: smartpqi: identify physical devices without issuing INQUIRY (bsc#1172418).\n- scsi: smartpqi: properly set both the DMA mask and the coherent DMA mask (bsc#1172418).\n- scsi: smartpqi: remove unused manifest constants (bsc#1172418).\n- scsi: smartpqi: Reporting unhandled SCSI errors (bsc#1172418).\n- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).\n- scsi: smartpqi: update copyright (bsc#1172418).\n- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).\n- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).\n- scsi: storvsc: Correctly set number of hardware queues for IDE disk (git-fixes).\n- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).\n- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).\n- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).\n- soc: fsl: qbman: allow registering a device link for the portal user (bsc#1174550).\n- soc: fsl: qbman_portals: add APIs to retrieve the probing status (bsc#1174550).\n- spi: davinci: Remove uninitialized_var() usage (git-fixes).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n- spi: nxp-fspi: Ensure width is respected in spi-mem operations (bsc#1175421).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1175422).\n- spi: spi-mem: export spi_mem_default_supports_op() (bsc#1175421).\n- spi: sun4i: update max transfer size reported (git-fixes).\n- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n- staging: fsl-dpaa2: ethsw: Add missing netdevice check (bsc#1175423).\n- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging/speakup: fix get_word non-space look-ahead (git-fixes).\n- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).\n- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).\n- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).\n- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).\n- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).\n- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tracepoint: Mark __tracepoint_string\u0027s __used (git-fixes).\n- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: serial: fsl_lpuart: add imx8qxp support (bsc#1175670).\n- tty: serial: fsl_lpuart: free IDs allocated by IDA (bsc#1175670).\n- USB: iowarrior: fix up report size handling for some devices (git-fixes).\n- usbip: tools: fix module name in man page (git-fixes).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n- USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n- VFS: Check rename_lock in lookup_fast() (bsc#1174734).\n- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n- video: pxafb: Fix the function used to balance a \u0027dma_alloc_coherent()\u0027 call (git-fixes).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).\n- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (bsc#1111666).\n- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (bsc#1111666).\n- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (bsc#1111666).\n- wl1251: fix always return 0 error (git-fixes).\n- x86/hyper-v: Fix overflow bug in fill_gva_list() (git-fixes).\n- xfrm: check id proto in validate_tmpl() (git-fixes).\n- xfrm: clean up xfrm protocol checks (git-fixes).\n- xfrm_user: uncoditionally validate esn replay attribute struct (git-fixes).\n- xfs: fix inode allocation block res calculation precedence (git-fixes).\n- xfs: fix reflink quota reservation accounting error (git-fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-2605,SUSE-SLE-RT-12-SP5-2020-2605",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2605-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:2605-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202605-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:2605-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1074701",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "self",
"summary": "SUSE Bug 1083548",
"url": "https://bugzilla.suse.com/1083548"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1085235",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1087078",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1094912",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "self",
"summary": "SUSE Bug 1100394",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "self",
"summary": "SUSE Bug 1102640",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "self",
"summary": "SUSE Bug 1105412",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1120163",
"url": "https://bugzilla.suse.com/1120163"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1144333",
"url": "https://bugzilla.suse.com/1144333"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1172108",
"url": "https://bugzilla.suse.com/1172108"
},
{
"category": "self",
"summary": "SUSE Bug 1172247",
"url": "https://bugzilla.suse.com/1172247"
},
{
"category": "self",
"summary": "SUSE Bug 1172418",
"url": "https://bugzilla.suse.com/1172418"
},
{
"category": "self",
"summary": "SUSE Bug 1172428",
"url": "https://bugzilla.suse.com/1172428"
},
{
"category": "self",
"summary": "SUSE Bug 1172781",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "self",
"summary": "SUSE Bug 1172782",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "self",
"summary": "SUSE Bug 1172783",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "self",
"summary": "SUSE Bug 1172871",
"url": "https://bugzilla.suse.com/1172871"
},
{
"category": "self",
"summary": "SUSE Bug 1172872",
"url": "https://bugzilla.suse.com/1172872"
},
{
"category": "self",
"summary": "SUSE Bug 1172963",
"url": "https://bugzilla.suse.com/1172963"
},
{
"category": "self",
"summary": "SUSE Bug 1173485",
"url": "https://bugzilla.suse.com/1173485"
},
{
"category": "self",
"summary": "SUSE Bug 1173798",
"url": "https://bugzilla.suse.com/1173798"
},
{
"category": "self",
"summary": "SUSE Bug 1173954",
"url": "https://bugzilla.suse.com/1173954"
},
{
"category": "self",
"summary": "SUSE Bug 1174026",
"url": "https://bugzilla.suse.com/1174026"
},
{
"category": "self",
"summary": "SUSE Bug 1174070",
"url": "https://bugzilla.suse.com/1174070"
},
{
"category": "self",
"summary": "SUSE Bug 1174161",
"url": "https://bugzilla.suse.com/1174161"
},
{
"category": "self",
"summary": "SUSE Bug 1174205",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "self",
"summary": "SUSE Bug 1174247",
"url": "https://bugzilla.suse.com/1174247"
},
{
"category": "self",
"summary": "SUSE Bug 1174343",
"url": "https://bugzilla.suse.com/1174343"
},
{
"category": "self",
"summary": "SUSE Bug 1174356",
"url": "https://bugzilla.suse.com/1174356"
},
{
"category": "self",
"summary": "SUSE Bug 1174387",
"url": "https://bugzilla.suse.com/1174387"
},
{
"category": "self",
"summary": "SUSE Bug 1174409",
"url": "https://bugzilla.suse.com/1174409"
},
{
"category": "self",
"summary": "SUSE Bug 1174438",
"url": "https://bugzilla.suse.com/1174438"
},
{
"category": "self",
"summary": "SUSE Bug 1174462",
"url": "https://bugzilla.suse.com/1174462"
},
{
"category": "self",
"summary": "SUSE Bug 1174484",
"url": "https://bugzilla.suse.com/1174484"
},
{
"category": "self",
"summary": "SUSE Bug 1174547",
"url": "https://bugzilla.suse.com/1174547"
},
{
"category": "self",
"summary": "SUSE Bug 1174549",
"url": "https://bugzilla.suse.com/1174549"
},
{
"category": "self",
"summary": "SUSE Bug 1174550",
"url": "https://bugzilla.suse.com/1174550"
},
{
"category": "self",
"summary": "SUSE Bug 1174625",
"url": "https://bugzilla.suse.com/1174625"
},
{
"category": "self",
"summary": "SUSE Bug 1174658",
"url": "https://bugzilla.suse.com/1174658"
},
{
"category": "self",
"summary": "SUSE Bug 1174685",
"url": "https://bugzilla.suse.com/1174685"
},
{
"category": "self",
"summary": "SUSE Bug 1174689",
"url": "https://bugzilla.suse.com/1174689"
},
{
"category": "self",
"summary": "SUSE Bug 1174699",
"url": "https://bugzilla.suse.com/1174699"
},
{
"category": "self",
"summary": "SUSE Bug 1174734",
"url": "https://bugzilla.suse.com/1174734"
},
{
"category": "self",
"summary": "SUSE Bug 1174757",
"url": "https://bugzilla.suse.com/1174757"
},
{
"category": "self",
"summary": "SUSE Bug 1174771",
"url": "https://bugzilla.suse.com/1174771"
},
{
"category": "self",
"summary": "SUSE Bug 1174840",
"url": "https://bugzilla.suse.com/1174840"
},
{
"category": "self",
"summary": "SUSE Bug 1174841",
"url": "https://bugzilla.suse.com/1174841"
},
{
"category": "self",
"summary": "SUSE Bug 1174843",
"url": "https://bugzilla.suse.com/1174843"
},
{
"category": "self",
"summary": "SUSE Bug 1174844",
"url": "https://bugzilla.suse.com/1174844"
},
{
"category": "self",
"summary": "SUSE Bug 1174845",
"url": "https://bugzilla.suse.com/1174845"
},
{
"category": "self",
"summary": "SUSE Bug 1174852",
"url": "https://bugzilla.suse.com/1174852"
},
{
"category": "self",
"summary": "SUSE Bug 1174873",
"url": "https://bugzilla.suse.com/1174873"
},
{
"category": "self",
"summary": "SUSE Bug 1174887",
"url": "https://bugzilla.suse.com/1174887"
},
{
"category": "self",
"summary": "SUSE Bug 1174904",
"url": "https://bugzilla.suse.com/1174904"
},
{
"category": "self",
"summary": "SUSE Bug 1174926",
"url": "https://bugzilla.suse.com/1174926"
},
{
"category": "self",
"summary": "SUSE Bug 1174968",
"url": "https://bugzilla.suse.com/1174968"
},
{
"category": "self",
"summary": "SUSE Bug 1175062",
"url": "https://bugzilla.suse.com/1175062"
},
{
"category": "self",
"summary": "SUSE Bug 1175063",
"url": "https://bugzilla.suse.com/1175063"
},
{
"category": "self",
"summary": "SUSE Bug 1175064",
"url": "https://bugzilla.suse.com/1175064"
},
{
"category": "self",
"summary": "SUSE Bug 1175065",
"url": "https://bugzilla.suse.com/1175065"
},
{
"category": "self",
"summary": "SUSE Bug 1175066",
"url": "https://bugzilla.suse.com/1175066"
},
{
"category": "self",
"summary": "SUSE Bug 1175067",
"url": "https://bugzilla.suse.com/1175067"
},
{
"category": "self",
"summary": "SUSE Bug 1175112",
"url": "https://bugzilla.suse.com/1175112"
},
{
"category": "self",
"summary": "SUSE Bug 1175127",
"url": "https://bugzilla.suse.com/1175127"
},
{
"category": "self",
"summary": "SUSE Bug 1175128",
"url": "https://bugzilla.suse.com/1175128"
},
{
"category": "self",
"summary": "SUSE Bug 1175149",
"url": "https://bugzilla.suse.com/1175149"
},
{
"category": "self",
"summary": "SUSE Bug 1175199",
"url": "https://bugzilla.suse.com/1175199"
},
{
"category": "self",
"summary": "SUSE Bug 1175213",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "self",
"summary": "SUSE Bug 1175228",
"url": "https://bugzilla.suse.com/1175228"
},
{
"category": "self",
"summary": "SUSE Bug 1175232",
"url": "https://bugzilla.suse.com/1175232"
},
{
"category": "self",
"summary": "SUSE Bug 1175284",
"url": "https://bugzilla.suse.com/1175284"
},
{
"category": "self",
"summary": "SUSE Bug 1175393",
"url": "https://bugzilla.suse.com/1175393"
},
{
"category": "self",
"summary": "SUSE Bug 1175394",
"url": "https://bugzilla.suse.com/1175394"
},
{
"category": "self",
"summary": "SUSE Bug 1175396",
"url": "https://bugzilla.suse.com/1175396"
},
{
"category": "self",
"summary": "SUSE Bug 1175397",
"url": "https://bugzilla.suse.com/1175397"
},
{
"category": "self",
"summary": "SUSE Bug 1175398",
"url": "https://bugzilla.suse.com/1175398"
},
{
"category": "self",
"summary": "SUSE Bug 1175399",
"url": "https://bugzilla.suse.com/1175399"
},
{
"category": "self",
"summary": "SUSE Bug 1175400",
"url": "https://bugzilla.suse.com/1175400"
},
{
"category": "self",
"summary": "SUSE Bug 1175401",
"url": "https://bugzilla.suse.com/1175401"
},
{
"category": "self",
"summary": "SUSE Bug 1175402",
"url": "https://bugzilla.suse.com/1175402"
},
{
"category": "self",
"summary": "SUSE Bug 1175403",
"url": "https://bugzilla.suse.com/1175403"
},
{
"category": "self",
"summary": "SUSE Bug 1175404",
"url": "https://bugzilla.suse.com/1175404"
},
{
"category": "self",
"summary": "SUSE Bug 1175405",
"url": "https://bugzilla.suse.com/1175405"
},
{
"category": "self",
"summary": "SUSE Bug 1175406",
"url": "https://bugzilla.suse.com/1175406"
},
{
"category": "self",
"summary": "SUSE Bug 1175407",
"url": "https://bugzilla.suse.com/1175407"
},
{
"category": "self",
"summary": "SUSE Bug 1175408",
"url": "https://bugzilla.suse.com/1175408"
},
{
"category": "self",
"summary": "SUSE Bug 1175409",
"url": "https://bugzilla.suse.com/1175409"
},
{
"category": "self",
"summary": "SUSE Bug 1175410",
"url": "https://bugzilla.suse.com/1175410"
},
{
"category": "self",
"summary": "SUSE Bug 1175411",
"url": "https://bugzilla.suse.com/1175411"
},
{
"category": "self",
"summary": "SUSE Bug 1175412",
"url": "https://bugzilla.suse.com/1175412"
},
{
"category": "self",
"summary": "SUSE Bug 1175413",
"url": "https://bugzilla.suse.com/1175413"
},
{
"category": "self",
"summary": "SUSE Bug 1175414",
"url": "https://bugzilla.suse.com/1175414"
},
{
"category": "self",
"summary": "SUSE Bug 1175415",
"url": "https://bugzilla.suse.com/1175415"
},
{
"category": "self",
"summary": "SUSE Bug 1175416",
"url": "https://bugzilla.suse.com/1175416"
},
{
"category": "self",
"summary": "SUSE Bug 1175417",
"url": "https://bugzilla.suse.com/1175417"
},
{
"category": "self",
"summary": "SUSE Bug 1175418",
"url": "https://bugzilla.suse.com/1175418"
},
{
"category": "self",
"summary": "SUSE Bug 1175419",
"url": "https://bugzilla.suse.com/1175419"
},
{
"category": "self",
"summary": "SUSE Bug 1175420",
"url": "https://bugzilla.suse.com/1175420"
},
{
"category": "self",
"summary": "SUSE Bug 1175421",
"url": "https://bugzilla.suse.com/1175421"
},
{
"category": "self",
"summary": "SUSE Bug 1175422",
"url": "https://bugzilla.suse.com/1175422"
},
{
"category": "self",
"summary": "SUSE Bug 1175423",
"url": "https://bugzilla.suse.com/1175423"
},
{
"category": "self",
"summary": "SUSE Bug 1175440",
"url": "https://bugzilla.suse.com/1175440"
},
{
"category": "self",
"summary": "SUSE Bug 1175493",
"url": "https://bugzilla.suse.com/1175493"
},
{
"category": "self",
"summary": "SUSE Bug 1175518",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "self",
"summary": "SUSE Bug 1175526",
"url": "https://bugzilla.suse.com/1175526"
},
{
"category": "self",
"summary": "SUSE Bug 1175550",
"url": "https://bugzilla.suse.com/1175550"
},
{
"category": "self",
"summary": "SUSE Bug 1175654",
"url": "https://bugzilla.suse.com/1175654"
},
{
"category": "self",
"summary": "SUSE Bug 1175666",
"url": "https://bugzilla.suse.com/1175666"
},
{
"category": "self",
"summary": "SUSE Bug 1175668",
"url": "https://bugzilla.suse.com/1175668"
},
{
"category": "self",
"summary": "SUSE Bug 1175669",
"url": "https://bugzilla.suse.com/1175669"
},
{
"category": "self",
"summary": "SUSE Bug 1175670",
"url": "https://bugzilla.suse.com/1175670"
},
{
"category": "self",
"summary": "SUSE Bug 1175767",
"url": "https://bugzilla.suse.com/1175767"
},
{
"category": "self",
"summary": "SUSE Bug 1175768",
"url": "https://bugzilla.suse.com/1175768"
},
{
"category": "self",
"summary": "SUSE Bug 1175769",
"url": "https://bugzilla.suse.com/1175769"
},
{
"category": "self",
"summary": "SUSE Bug 1175770",
"url": "https://bugzilla.suse.com/1175770"
},
{
"category": "self",
"summary": "SUSE Bug 1175771",
"url": "https://bugzilla.suse.com/1175771"
},
{
"category": "self",
"summary": "SUSE Bug 1175772",
"url": "https://bugzilla.suse.com/1175772"
},
{
"category": "self",
"summary": "SUSE Bug 1175786",
"url": "https://bugzilla.suse.com/1175786"
},
{
"category": "self",
"summary": "SUSE Bug 1175992",
"url": "https://bugzilla.suse.com/1175992"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0305 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14314 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14331 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14331/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14356 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16166 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24394 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24394/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2020-09-11T07:00:58Z",
"generator": {
"date": "2020-09-11T07:00:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:2605-1",
"initial_release_date": "2020-09-11T07:00:58Z",
"revision_history": [
{
"date": "2020-09-11T07:00:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.16.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.16.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.16.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.16.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.16.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.16.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.16.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.16.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.16.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.16.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.16.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.16.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2020-0305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0305"
}
],
"notes": [
{
"category": "general",
"text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0305",
"url": "https://www.suse.com/security/cve/CVE-2020-0305"
},
{
"category": "external",
"summary": "SUSE Bug 1174462 for CVE-2020-0305",
"url": "https://bugzilla.suse.com/1174462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-0305"
},
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2020-14314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14314"
}
],
"notes": [
{
"category": "general",
"text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14314",
"url": "https://www.suse.com/security/cve/CVE-2020-14314"
},
{
"category": "external",
"summary": "SUSE Bug 1173798 for CVE-2020-14314",
"url": "https://bugzilla.suse.com/1173798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-14314"
},
{
"cve": "CVE-2020-14331",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14331"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14331",
"url": "https://www.suse.com/security/cve/CVE-2020-14331"
},
{
"category": "external",
"summary": "SUSE Bug 1174205 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174205"
},
{
"category": "external",
"summary": "SUSE Bug 1174247 for CVE-2020-14331",
"url": "https://bugzilla.suse.com/1174247"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "important"
}
],
"title": "CVE-2020-14331"
},
{
"cve": "CVE-2020-14356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14356"
}
],
"notes": [
{
"category": "general",
"text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14356",
"url": "https://www.suse.com/security/cve/CVE-2020-14356"
},
{
"category": "external",
"summary": "SUSE Bug 1175213 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1175213"
},
{
"category": "external",
"summary": "SUSE Bug 1176392 for CVE-2020-14356",
"url": "https://bugzilla.suse.com/1176392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-14356"
},
{
"cve": "CVE-2020-16166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16166"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16166",
"url": "https://www.suse.com/security/cve/CVE-2020-16166"
},
{
"category": "external",
"summary": "SUSE Bug 1174757 for CVE-2020-16166",
"url": "https://bugzilla.suse.com/1174757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-16166"
},
{
"cve": "CVE-2020-24394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24394"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24394",
"url": "https://www.suse.com/security/cve/CVE-2020-24394"
},
{
"category": "external",
"summary": "SUSE Bug 1175518 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175518"
},
{
"category": "external",
"summary": "SUSE Bug 1175992 for CVE-2020-24394",
"url": "https://bugzilla.suse.com/1175992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.16.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.16.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-09-11T07:00:58Z",
"details": "important"
}
],
"title": "CVE-2020-24394"
}
]
}
SUSE-SU-2018:2331-1
Vulnerability from csaf_suse - Published: 2018-08-15 11:50 - Updated: 2018-08-15 11:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update to ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a) and is\npart of the mitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646\n(L1 Terminal fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-1573,SUSE-SLE-DESKTOP-12-SP3-2018-1573,SUSE-SLE-SAP-12-SP1-2018-1573,SUSE-SLE-SAP-12-SP2-2018-1573,SUSE-SLE-SERVER-12-2018-1573,SUSE-SLE-SERVER-12-SP1-2018-1573,SUSE-SLE-SERVER-12-SP2-2018-1573,SUSE-SLE-SERVER-12-SP3-2018-1573,SUSE-Storage-4-2018-1573",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2331-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2331-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2331-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1089343",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "self",
"summary": "SUSE Bug 1104134",
"url": "https://bugzilla.suse.com/1104134"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
}
],
"title": "Security update to ucode-intel",
"tracking": {
"current_release_date": "2018-08-15T11:50:29Z",
"generator": {
"date": "2018-08-15T11:50:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2331-1",
"initial_release_date": "2018-08-15T11:50:29Z",
"revision_history": [
{
"date": "2018-08-15T11:50:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ucode-intel-20180807-13.29.1.x86_64",
"product": {
"name": "ucode-intel-20180807-13.29.1.x86_64",
"product_id": "ucode-intel-20180807-13.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ucode-intel-20180807-13.29.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64"
},
"product_reference": "ucode-intel-20180807-13.29.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T11:50:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T11:50:29Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:ucode-intel-20180807-13.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:ucode-intel-20180807-13.29.1.x86_64",
"SUSE OpenStack Cloud 7:ucode-intel-20180807-13.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T11:50:29Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
}
]
}
SUSE-SU-2023:3324-1
Vulnerability from csaf_suse - Published: 2023-08-16 06:13 - Updated: 2023-08-16 06:13Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20784: Fixed a denial of service (infinite loop in update_blocked_averages) by mishandled leaf cfs_rq in kernel/sched/fair.c (bsc#1126703).\n- CVE-2018-3639: Fixed Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1087082).\n- CVE-2022-40982: Fixed transient execution attack called \u0027Gather Data Sampling\u0027 (bsc#1206418).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).\n- CVE-2023-20569: Fixed side channel attack \u2018Inception\u2019 or \u2018RAS Poisoning\u2019 (bsc#1213287).\n- CVE-2023-20593: Fixed a ZenBleed issue in \u0027Zen 2\u0027 CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).\n- CVE-2023-3106: Fixed crash in XFRM_MSG_GETSA netlink handler (bsc#1213251).\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n\nThe following non-security bugs were fixed:\n\n- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).\n- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).\n- ubi: ensure that VID header offset + VID header size \u0026lt;= alloc, size (bsc#1210584).\n- x86: Treat R_X86_64_PLT32 as R_X86_64_PC32 (git-fixes) No it\u0027s not git-fixes it\u0027s used to make sle12-sp2 compile with newer toolchain to make the life of all the poor souls maintaining this ancient kernel on their modern machines, a little bit easier....\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3324,SUSE-SLE-SERVER-12-SP2-BCL-2023-3324",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3324-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3324-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233324-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3324-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1126703",
"url": "https://bugzilla.suse.com/1126703"
},
{
"category": "self",
"summary": "SUSE Bug 1206418",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "self",
"summary": "SUSE Bug 1207561",
"url": "https://bugzilla.suse.com/1207561"
},
{
"category": "self",
"summary": "SUSE Bug 1209779",
"url": "https://bugzilla.suse.com/1209779"
},
{
"category": "self",
"summary": "SUSE Bug 1210584",
"url": "https://bugzilla.suse.com/1210584"
},
{
"category": "self",
"summary": "SUSE Bug 1211738",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "self",
"summary": "SUSE Bug 1211867",
"url": "https://bugzilla.suse.com/1211867"
},
{
"category": "self",
"summary": "SUSE Bug 1212502",
"url": "https://bugzilla.suse.com/1212502"
},
{
"category": "self",
"summary": "SUSE Bug 1213059",
"url": "https://bugzilla.suse.com/1213059"
},
{
"category": "self",
"summary": "SUSE Bug 1213167",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "self",
"summary": "SUSE Bug 1213251",
"url": "https://bugzilla.suse.com/1213251"
},
{
"category": "self",
"summary": "SUSE Bug 1213286",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "self",
"summary": "SUSE Bug 1213287",
"url": "https://bugzilla.suse.com/1213287"
},
{
"category": "self",
"summary": "SUSE Bug 1213585",
"url": "https://bugzilla.suse.com/1213585"
},
{
"category": "self",
"summary": "SUSE Bug 1213588",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20784 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0459 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-1637 page",
"url": "https://www.suse.com/security/cve/CVE-2023-1637/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20569 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20569/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2985 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3106 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3268 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-35001 page",
"url": "https://www.suse.com/security/cve/CVE-2023-35001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3611 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3776 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3776/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-08-16T06:13:06Z",
"generator": {
"date": "2023-08-16T06:13:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3324-1",
"initial_release_date": "2023-08-16T06:13:06Z",
"revision_history": [
{
"date": "2023-08-16T06:13:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.208.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.208.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.208.1.aarch64",
"product_id": "kernel-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.208.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.208.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.208.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.208.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.208.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.208.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.208.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.208.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.208.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.208.1.noarch",
"product_id": "kernel-devel-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.208.1.noarch",
"product_id": "kernel-docs-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.208.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.208.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.208.1.noarch",
"product_id": "kernel-macros-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.208.1.noarch",
"product_id": "kernel-source-4.4.121-92.208.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.208.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.208.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.208.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.208.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.208.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.208.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.208.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.208.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.208.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.208.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.208.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.208.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.208.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.208.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.208.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.208.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.208.1.s390x",
"product_id": "kernel-syms-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.208.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.208.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.208.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.208.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.208.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.208.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.208.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.208.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.208.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.208.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.208.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.208.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.208.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.208.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.208.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.208.1.x86_64",
"product_id": "kernel-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.208.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.208.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.208.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.208.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.208.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.208.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.208.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.208.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.208.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.208.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.208.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.208.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.208.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.208.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.208.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.208.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.208.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.208.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.208.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-20784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20784"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq\u0027s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20784",
"url": "https://www.suse.com/security/cve/CVE-2018-20784"
},
{
"category": "external",
"summary": "SUSE Bug 1126703 for CVE-2018-20784",
"url": "https://bugzilla.suse.com/1126703"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-20784"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2023-0459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0459"
}
],
"notes": [
{
"category": "general",
"text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0459",
"url": "https://www.suse.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "SUSE Bug 1211738 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-0459"
},
{
"cve": "CVE-2023-1637",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-1637"
}
],
"notes": [
{
"category": "general",
"text": "A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-1637",
"url": "https://www.suse.com/security/cve/CVE-2023-1637"
},
{
"category": "external",
"summary": "SUSE Bug 1209779 for CVE-2023-1637",
"url": "https://bugzilla.suse.com/1209779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-1637"
},
{
"cve": "CVE-2023-20569",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20569"
}
],
"notes": [
{
"category": "general",
"text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20569",
"url": "https://www.suse.com/security/cve/CVE-2023-20569"
},
{
"category": "external",
"summary": "SUSE Bug 1213287 for CVE-2023-20569",
"url": "https://bugzilla.suse.com/1213287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-20569"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-2985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2985"
}
],
"notes": [
{
"category": "general",
"text": "A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2985",
"url": "https://www.suse.com/security/cve/CVE-2023-2985"
},
{
"category": "external",
"summary": "SUSE Bug 1211867 for CVE-2023-2985",
"url": "https://bugzilla.suse.com/1211867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-2985"
},
{
"cve": "CVE-2023-3106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3106"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3106",
"url": "https://www.suse.com/security/cve/CVE-2023-3106"
},
{
"category": "external",
"summary": "SUSE Bug 1213251 for CVE-2023-3106",
"url": "https://bugzilla.suse.com/1213251"
},
{
"category": "external",
"summary": "SUSE Bug 1222212 for CVE-2023-3106",
"url": "https://bugzilla.suse.com/1222212"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-3106"
},
{
"cve": "CVE-2023-3268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3268"
}
],
"notes": [
{
"category": "general",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3268",
"url": "https://www.suse.com/security/cve/CVE-2023-3268"
},
{
"category": "external",
"summary": "SUSE Bug 1212502 for CVE-2023-3268",
"url": "https://bugzilla.suse.com/1212502"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3268",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-35001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-35001"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-35001",
"url": "https://www.suse.com/security/cve/CVE-2023-35001"
},
{
"category": "external",
"summary": "SUSE Bug 1213059 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1213059"
},
{
"category": "external",
"summary": "SUSE Bug 1213063 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1213063"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-35001",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "important"
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3567"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3567",
"url": "https://www.suse.com/security/cve/CVE-2023-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1213167 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "external",
"summary": "SUSE Bug 1213244 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213244"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "important"
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-3611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3611"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.\n\nWe recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3611",
"url": "https://www.suse.com/security/cve/CVE-2023-3611"
},
{
"category": "external",
"summary": "SUSE Bug 1213585 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1213585"
},
{
"category": "external",
"summary": "SUSE Bug 1223091 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1223091"
},
{
"category": "external",
"summary": "SUSE Bug 1223973 for CVE-2023-3611",
"url": "https://bugzilla.suse.com/1223973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "moderate"
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3776"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3776",
"url": "https://www.suse.com/security/cve/CVE-2023-3776"
},
{
"category": "external",
"summary": "SUSE Bug 1213588 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "external",
"summary": "SUSE Bug 1215119 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215119"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223091 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223091"
},
{
"category": "external",
"summary": "SUSE Bug 1223973 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.208.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.208.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.208.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T06:13:06Z",
"details": "important"
}
],
"title": "CVE-2023-3776"
}
]
}
SUSE-SU-2018:1366-1
Vulnerability from csaf_suse - Published: 2018-05-22 11:33 - Updated: 2018-05-22 11:33Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.131 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c\n had an integer-overflow vulnerability allowing local users with access\n to the udldrmfb driver to obtain full read and write permissions on\n kernel physical pages, resulting in a code execution in kernel space\n (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c\n might have allowed local users to cause a denial of service via an\n INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might\n have allowed local users to cause a denial of service by triggering an\n attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-1130: The Linux kernel was vulnerable to a null pointer\n dereference in dccp_write_xmit() function in net/dccp/output.c in that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bnc#1092904).\n- CVE-2018-5803: An error in the _sctp_make_chunk() function when handling\n SCTP, packet length could have been exploited by a malicious local user\n to cause a kernel crash and a DoS. (bnc#1083900).\n- CVE-2018-1065: The netfilter subsystem mishandled the case of\n a rule blob that contains a jump but lacks a user-defined chain,\n which allowed local users to cause a denial of service (NULL\n pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN\n capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c,\n ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in\n net/ipv6/netfilter/ip6_tables.c (bnc#1083650 1091925).\n- CVE-2018-7492: A NULL pointer dereference was found in the\n net/rds/rdma.c __rds_rdma_map() function allowing local attackers to\n cause a system panic and a denial-of-service, related to RDS_GET_MR and\n RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- acpica: Disassembler: Abort on an invalid/unknown AML opcode (bnc#1012382).\n- acpica: Events: Add runtime stub support for event APIs (bnc#1012382).\n- acpi / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).\n- acpi, PCI, irq: remove redundant check for null string pointer (bnc#1012382).\n- acpi / scan: Send change uevent with offine environmental data (bsc#1082485).\n- acpi / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).\n- alsa: asihpi: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: control: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).\n- alsa: hda: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: hda - New VIA controller suppor no-snoop path (bnc#1012382).\n- alsa: hda/realtek - Add some fixes for ALC233 (bnc#1012382).\n- alsa: hdspm: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: line6: Use correct endpoint type for midi output (bnc#1012382).\n- alsa: opl3: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).\n- alsa: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).\n- alsa: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).\n- alsa: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).\n- alsa: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).\n- alsa: pcm: potential uninitialized return values (bnc#1012382).\n- alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).\n- alsa: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bnc#1012382).\n- alsa: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).\n- alsa: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).\n- alsa: rme9652: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).\n- alsa: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- arm64: avoid overflow in VA_START and PAGE_OFFSET (bnc#1012382).\n- arm64: futex: Fix undefined behaviour with FUTEX_OP_OPARG_SHIFT usage (bnc#1012382).\n- arm: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (bnc#1012382).\n- arm: amba: Fix race condition with driver_override (bnc#1012382).\n- arm: amba: Make driver_override output consistent with other buses (bnc#1012382).\n- arm: davinci: da8xx: Create DSP device only when assigned memory (bnc#1012382).\n- arm: dts: am57xx-beagle-x15-common: Add overide powerhold property (bnc#1012382).\n- arm: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).\n- arm: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).\n- arm: dts: dra7: Add power hold and power controller properties to palmas (bnc#1012382).\n- arm: dts: imx53-qsrb: Pulldown PMIC IRQ pin (bnc#1012382).\n- arm: dts: imx6qdl-wandboard: Fix audio channel swap (bnc#1012382).\n- arm: dts: ls1021a: add \u0027fsl,ls1021a-esdhc\u0027 compatible string to esdhc node (bnc#1012382).\n- arm: imx: Add MXC_CPU_IMX6ULL and cpu_is_imx6ull (bnc#1012382).\n- arp: fix arp_filter on l3slave devices (bnc#1012382).\n- arp: honour gratuitous ARP _replies_ (bnc#1012382).\n- asoc: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).\n- asoc: Intel: cht_bsw_rt5645: Analog Mic support (bnc#1012382).\n- asoc: rsnd: SSI PIO adjust to 24bit mode (bnc#1012382).\n- asoc: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).\n- async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome() (bnc#1012382).\n- ata: libahci: properly propagate return value of platform_get_irq() (bnc#1012382).\n- ath5k: fix memory leak on buf on failed eeprom read (bnc#1012382).\n- ath9k_hw: check if the chip failed to wake up (bnc#1012382).\n- audit: add tty field to LOGIN event (bnc#1012382).\n- autofs: mount point create should honour passed in mode (bnc#1012382).\n- bcache: segregate flash only volume write streams (bnc#1012382).\n- bcache: stop writeback thread after detaching (bnc#1012382).\n- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)\n- blk-mq: fix bad clear of RQF_MQ_INFLIGHT in blk_mq_ct_ctx_init() (bsc#1085058).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bnc#1012382).\n- block: correctly mask out flags in blk_rq_append_bio() (bsc#1085058).\n- block/loop: fix deadlock after loop_set_status (bnc#1012382).\n- block: sanity check for integrity intervals (bsc#1091728).\n- bluetooth: Fix missing encryption refresh on Security Request (bnc#1012382).\n- bluetooth: Send HCI Set Event Mask Page 2 command only when needed (bnc#1012382).\n- bna: Avoid reading past end of buffer (bnc#1012382).\n- bnx2x: Allow vfs to disable txvlan offload (bnc#1012382).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).\n- bonding: Do not update slave-\u003elink until ready to commit (bnc#1012382).\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (bnc#1012382).\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (bnc#1012382).\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (bnc#1012382).\n- btrfs: fix incorrect error return ret being passed to mapping_set_error (bnc#1012382).\n- btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- bus: brcmstb_gisb: correct support for 64-bit address output (bnc#1012382).\n- bus: brcmstb_gisb: Use register offsets with writes too (bnc#1012382).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (fate#324665 bsc#1089115).\n- ceph: do not check quota for snap inode (fate#324665 bsc#1089115).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix root quota realm check (fate#324665 bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: quota: add counter for snaprealms with quota (fate#324665 bsc#1089115).\n- ceph: quota: add initial infrastructure to support cephfs quotas (fate#324665 bsc#1089115).\n- ceph: quota: cache inode pointer in ceph_snap_realm (fate#324665 bsc#1089115).\n- ceph: quota: do not allow cross-quota renames (fate#324665 bsc#1089115).\n- ceph: quota: report root dir quota usage in statfs (fate#324665 bsc#1089115).\n- ceph: quota: support for ceph.quota.max_bytes (fate#324665 bsc#1089115).\n- ceph: quota: support for ceph.quota.max_files (fate#324665 bsc#1089115).\n- ceph: quota: update MDS when max_bytes is approaching (fate#324665 bsc#1089115).\n- cfg80211: make RATE_INFO_BW_20 the default (bnc#1012382).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- cifs: silence lockdep splat in cifs_relock_file() (bnc#1012382).\n- cifs: Use file_dentry() (bsc#1093008).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).\n- clk: Fix __set_clk_rates error print-string (bnc#1012382).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).\n- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).\n- clk: scpi: fix return type of __scpi_dvfs_round_rate (bnc#1012382).\n- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).\n- cpumask: Add helper cpumask_available() (bnc#1012382).\n- crypto: ahash - Fix early termination in hash walk (bnc#1012382).\n- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bnc#1012382).\n- cx25840: fix unchecked return values (bnc#1012382).\n- cxgb4: fix incorrect cim_la output for T6 (bnc#1012382).\n- cxgb4: Fix queue free path of ULD drivers (bsc#1022743 FATE#322540).\n- cxgb4: FW upgrade fixes (bnc#1012382).\n- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bnc#1012382).\n- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).\n- dmaengine: imx-sdma: Handle return value of clk_prepare_enable (bnc#1012382).\n- dm ioctl: remove double parentheses (bnc#1012382).\n- Documentation: pinctrl: palmas: Add ti,palmas-powerhold-override property definition (bnc#1012382).\n- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).\n- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (FATE#321732).\n- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bnc#1024296,FATE#321265).\n- drivers/misc/vmw_vmci/vmci_queue_pair.c: fix a couple integer overflow tests (bnc#1012382).\n- drm/omap: fix tiled buffer stride calculations (bnc#1012382).\n- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).\n- drm/virtio: fix vq wait_event condition (bnc#1012382).\n- e1000e: fix race condition around skb_tstamp_tx() (bnc#1012382).\n- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bnc#1012382).\n- edac, mv64x60: Fix an error handling path (bnc#1012382).\n- Enable uinput driver (bsc#1092566).\n- esp: Fix memleaks on error paths (git-fixes).\n- ext4: add validity checks for bitmap block numbers (bnc#1012382).\n- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).\n- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).\n- ext4: fix bitmap position validation (bnc#1012382).\n- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: fix off-by-one on max nr_pages in ext4_find_unwritten_pgoff() (bnc#1012382).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).\n- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).\n- fanotify: fix logic of events on child (bnc#1012382).\n- fix race in drivers/char/random.c:get_reg() (bnc#1012382).\n- frv: declare jiffies to be located in the .data section (bnc#1012382).\n- fs: compat: Remove warning from COMPATIBLE_IOCTL (bnc#1012382).\n- fs/proc: Stop trying to report thread stacks (bnc#1012382).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).\n- genirq: Use cpumask_available() for check of cpumask variable (bnc#1012382).\n- getname_kernel() needs to make sure that -\u003ename != -\u003einame in long case (bnc#1012382).\n- gpio: label descriptors using the device name (bnc#1012382).\n- hdlcdrv: Fix divide by zero in hdlcdrv_ioctl (bnc#1012382).\n- hid: core: Fix size as type u32 (bnc#1012382).\n- hid: Fix hid_report_len usage (bnc#1012382).\n- hid: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).\n- hid: i2c-hid: fix size check and type usage (bnc#1012382).\n- hwmon: (ina2xx) Fix access to uninitialized mutex (git-fixes).\n- hwmon: (ina2xx) Make calibration register value fixed (bnc#1012382).\n- hypfs_kill_super(): deal with failed allocations (bnc#1012382).\n- i40iw: Free IEQ resources (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- ib/core: Fix possible crash to access NULL netdev (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/core: Generate GID change event regardless of RoCE GID table property (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx4: Fix corruption of RoCEv2 IPv4 GIDs (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx4: Include GID type when deleting GIDs from HW table under RoCE (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx5: Avoid passing an invalid QP type to firmware (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ib/mlx5: Fix an error code in __mlx5_ib_modify_qp() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: Fix incorrect size of klms in the memory region (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: Fix out-of-bounds read in create_raw_packet_qp_rq (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: revisit -Wmaybe-uninitialized warning (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ib/mlx5: Set the default active rate and width to QDR and 4X (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ib/srp: Fix completion vector assignment algorithm (bnc#1012382).\n- ib/srp: Fix srp_abort() (bnc#1012382).\n- ib/srpt: Fix abort handling (bnc#1012382).\n- ib/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bnc#1024296,FATE#321265).\n- iio: hi8435: avoid garbage event at first enable (bnc#1012382).\n- iio: hi8435: cleanup reset gpio (bnc#1012382).\n- iio: magnetometer: st_magn_spi: fix spi_device_id table (bnc#1012382).\n- input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).\n- input: ALPS - fix trackstick button handling on V8 devices (git-fixes).\n- input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).\n- input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).\n- input: drv260x - fix initializing overdrive voltage (bnc#1012382).\n- input: elan_i2c - check if device is there before really probing (bnc#1012382).\n- input: elan_i2c - clear INT before resetting controller (bnc#1012382).\n- input: elantech - force relative mode on a certain module (bnc#1012382).\n- input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bnc#1012382).\n- input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bnc#1012382).\n- input: mousedev - fix implicit conversion warning (bnc#1012382).\n- iommu/vt-d: Fix a potential memory leak (bnc#1012382).\n- ip6_gre: better validate user provided tunnel names (bnc#1012382).\n- ip6_tunnel: better validate user provided tunnel names (bnc#1012382).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).\n- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799). Refresh patch to mainline version.\n- ipsec: check return value of skb_to_sgvec always (bnc#1012382).\n- ip_tunnel: better validate user provided tunnel names (bnc#1012382).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).\n- ipv6: avoid dad-failures for addresses with NODAD (bnc#1012382).\n- ipv6: sit: better validate user provided tunnel names (bnc#1012382).\n- ipv6: the entire IPv6 header chain must fit the first fragment (bnc#1012382).\n- iw_cxgb4: print mapped ports correctly (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).\n- jbd2: fix use after free in kjournald2() (bnc#1012382).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).\n- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).\n- jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp (bnc#1012382).\n- kABI: add tty include to audit.c (kabi).\n- kABI: protect hid report functions (kabi).\n- kABI: protect jiffies types (kabi).\n- kABI: protect skb_to_sgvec* (kabi).\n- kABI: protect sound/timer.h include in sound pcm.c (kabi).\n- kABI: protect struct cstate (kabi).\n- kABI: protect struct _lowcore (kabi).\n- kABI: protect tty include in audit.h (kabi).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kbuild: provide a __UNIQUE_ID for clang (bnc#1012382).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).\n- keys: DNS: limit the length of option strings (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kobject: do not use WARN for registration failures (bnc#1012382).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: nVMX: Fix handling of lmsw instruction (bnc#1012382).\n- kvm: PPC: Book3S PR: Check copy_to/from_user return values (bnc#1012382).\n- kvm: SVM: do not zero out segment attributes if segment is unusable or not present (bnc#1012382).\n- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).\n- l2tp: fix missing print session offset info (bnc#1012382).\n- lan78xx: Correctly indicate invalid OTP (bnc#1012382).\n- leds: pca955x: Correct I2C Functionality (bnc#1012382).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).\n- llc: hold llc_sap before release_sock() (bnc#1012382).\n- llist: clang: introduce member_address_is_nonnull() (bnc#1012382).\n- lockd: fix lockd shutdown race (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (git-fixes).\n- mac80211: bail out from prep_connection() if a reconfig is ongoing (bnc#1012382).\n- mceusb: sporadic RX truncation corruption fix (bnc#1012382).\n- md: document lifetime of internal rdev pointer (bsc#1056415).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1089023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).\n- md raid10: fix NULL deference in handle_write_completed() (git-fixes).\n- md/raid10: reset the \u0027first\u0027 at the end of loop (bnc#1012382).\n- md/raid5: make use of spin_lock_irq over local_irq_disable + spin_lock (bnc#1012382).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).\n- media: videobuf2-core: do not go out of the buffer range (bnc#1012382).\n- mei: remove dev_err message on an unsupported ioctl (bnc#1012382).\n- mISDN: Fix a sleep-in-atomic bug (bnc#1012382).\n- mlx5: fix bug reading rss_hash_type from CQE (bnc#1012382).\n- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).\n- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).\n- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).\n- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bnc#1012382).\n- neighbour: update neigh timestamps iff update is effective (bnc#1012382).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).\n- net: cavium: liquidio: fix up \u0027Avoid dma_unmap_single on uninitialized ndata\u0027 (bnc#1012382).\n- net: cdc_ncm: Fix TX zero padding (bnc#1012382).\n- net: emac: fix reset timeout with AR8035 phy (bnc#1012382).\n- net: ethernet: ti: cpsw: adjust cpsw fifos depth for fullduplex flow control (bnc#1012382).\n- netfilter: bridge: ebt_among: add more missing match size checks (bnc#1012382).\n- netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize (bnc#1012382).\n- netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch (bnc#1012382).\n- netfilter: nf_nat_h323: fix logical-not-parentheses warning (bnc#1012382).\n- netfilter: x_tables: add and use xt_check_proc_name (bnc#1012382).\n- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).\n- net: fix possible out-of-bound read in skb_network_protocol() (bnc#1012382).\n- net: fool proof dev_valid_name() (bnc#1012382).\n- net: freescale: fix potential null pointer dereference (bnc#1012382).\n- net: hns: Fix ethtool private flags (bnc#1012382 bsc#1085511).\n- net: ieee802154: fix net_device reference release too early (bnc#1012382).\n- net/ipv6: Fix route leaking between VRFs (bnc#1012382).\n- net/ipv6: Increment OUTxxx counters after netfilter hook (bnc#1012382).\n- netlink: make sure nladdr has correct size in netlink_connect() (bnc#1012382).\n- net: llc: add lock_sock in llc_ui_bind to avoid a race condition (bnc#1012382).\n- net/mlx4: Check if Granular QoS per VF has been enabled before updating QP qos_vport (bnc#1012382).\n- net/mlx4_core: Fix memory leak while delete slave\u0027s resources (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- net/mlx4_en: Avoid adding steering rules with invalid ring (bnc#1012382).\n- net/mlx4_en: Fix mixed PFC and Global pause user control requests (bsc#1015336 FATE#321685 bsc#1015337 FATE#321686 bsc#1015340 FATE#321687).\n- net/mlx4: Fix the check in attaching steering rules (bnc#1012382).\n- net/mlx5: avoid build warning for uniprocessor (bnc#1012382).\n- net/mlx5e: Add error print in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Check support before TC swap in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: E-Switch, Use the name of static array instead of its address (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix error handling in load one (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix ingress/egress naming mistake (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Tolerate irq_set_affinity_hint() failures (bnc#1012382).\n- net: move somaxconn init from sysctl code (bnc#1012382).\n- net: phy: avoid genphy_aneg_done() for PHYs without clause 22 support (bnc#1012382).\n- net: qca_spi: Fix alignment issues in rx path (bnc#1012382).\n- net sched actions: fix dumping which requires several messages to user space (bnc#1012382).\n- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bnc#1012382).\n- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).\n- net: x25: fix one potential use-after-free issue (bnc#1012382).\n- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (bnc#1012382).\n- nfsv4.1: RECLAIM_COMPLETE must handle NFS4ERR_CONN_NOT_BOUND_TO_SESSION (bnc#1012382).\n- nfsv4.1: Work around a Linux server bug.. (bnc#1012382).\n- nospec: Kill array_index_nospec_mask_check() (bnc#1012382).\n- nospec: Move array_index_nospec() parameter checking into separate macro (bnc#1012382).\n- ovl: filter trusted xattr for non-admin (bnc#1012382).\n- packet: fix bitfield update race (bnc#1012382).\n- parisc: Fix out of array access in match_pci_device() (bnc#1012382).\n- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bnc#1012382).\n- partitions/msdos: Unable to mount UFS 44bsd partitions (bnc#1012382).\n- pci/cxgb4: Extend T3 PCI quirk to T4+ devices (bsc#981348).\n- pci: Make PCI_ROM_ADDRESS_MASK a 32-bit constant (bnc#1012382).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1012382).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf header: Set proper module name when build-id event found (bnc#1012382).\n- perf/hwbp: Simplify the perf-hwbp code, fix documentation (bnc#1012382).\n- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).\n- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).\n- perf intel-pt: Fix sync_switch (bnc#1012382).\n- perf intel-pt: Fix timestamp following overflow (bnc#1012382).\n- perf probe: Add warning message if there is unexpected event name (bnc#1012382).\n- perf report: Ensure the perf DSO mapping matches what libdw sees (bnc#1012382).\n- perf: Return proper values for user stack errors (bnc#1012382).\n- perf tests: Decompress kernel module before objdump (bnc#1012382).\n- perf tools: Fix copyfile_offset update of output offset (bnc#1012382).\n- perf trace: Add mmap alias for s390 (bnc#1012382).\n- pidns: disable pid allocation if pid_ns_prepare_proc() is failed in alloc_pid() (bnc#1012382).\n- pNFS/flexfiles: missing error code in ff_layout_alloc_lseg() (bnc#1012382).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/[booke|4xx]: Do not clobber TCR[WP] when setting TCR[DIE] (bnc#1012382).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).\n- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).\n- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). Update patches.suse/powerpc-pseries-rfi-flush-Call-setup_rfi_flush-after.patch (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/spufs: Fix coredump of SPU contexts (bnc#1012382).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).\n- pptp: remove a buggy dst release in pptp_connect() (bnc#1012382).\n- qlge: Avoid reading past end of buffer (bnc#1012382).\n- r8152: add Linksys USB3GIGV1 id (bnc#1012382).\n- r8169: fix setting driver_data after register_netdev (bnc#1012382).\n- radeon: hide pointless #warning when compile testing (bnc#1012382).\n- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).\n- random: use lockless method of accessing and updating f-\u003ereg_idx (bnc#1012382).\n- ray_cs: Avoid reading past end of buffer (bnc#1012382).\n- rdma/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (FATE#321732).\n- rdma/mlx5: Protect from NULL pointer derefence (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- rdma/qedr: fix QP\u0027s ack timeout configuration (bsc#1022604 FATE#321747).\n- rdma/qedr: Fix QP state initialization race (bsc#1022604 FATE#321747).\n- rdma/qedr: Fix rc initialization on CNQ allocation failure (bsc#1022604 FATE#321747).\n- rdma/rxe: Fix an out-of-bounds read (FATE#322149).\n- rdma/ucma: Check AF family prior resolving address (bnc#1012382).\n- rdma/ucma: Check that device exists prior to accessing it (bnc#1012382).\n- rdma/ucma: Check that device is connected prior to access it (bnc#1012382).\n- rdma/ucma: Do not allow join attempts for unsupported AF family (bnc#1012382).\n- rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).\n- rdma/ucma: Ensure that CM_ID exists prior to access it (bnc#1012382).\n- rdma/ucma: Fix use-after-free access in ucma_close (bnc#1012382).\n- rdma/ucma: Introduce safer rdma_addr_size() variants (bnc#1012382).\n- rds; Reset rs-\u003ers_bound_addr in rds_add_bound() failure path (bnc#1012382).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- resource: fix integer overflow at reallocation (bnc#1012382).\n- Revert \u0027alsa: pcm: Fix mutex unbalance in OSS emulation ioctls\u0027 (kabi).\n- Revert \u0027alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams\u0027 (kabi).\n- Revert \u0027arm: dts: am335x-pepper: Fix the audio CODEC\u0027s reset pin\u0027 (bnc#1012382).\n- Revert \u0027arm: dts: omap3-n900: Fix the audio CODEC\u0027s reset pin\u0027 (bnc#1012382).\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bnc#1012382).\n- Revert \u0027cpufreq: Fix governor module removal race\u0027 (bnc#1012382).\n- Revert \u0027ip6_vti: adjust vti mtu according to mtu of lower device\u0027 (bnc#1012382).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- Revert \u0027mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block.\u0027 (kabi).\n- Revert \u0027mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug.\u0027 (kabi).\n- Revert \u0027mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block.\u0027 (kabi).\n- Revert \u0027mtip32xx: use runtime tag to initialize command header\u0027 (bnc#1012382).\n- Revert \u0027PCI/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown()\u0027 (bnc#1012382).\n- Revert \u0027perf tests: Decompress kernel module before objdump\u0027 (bnc#1012382).\n- Revert \u0027xhci: plat: Register shutdown for xhci_plat\u0027 (bnc#1012382).\n- rpc_pipefs: fix double-dput() (bnc#1012382).\n- rpm/config.sh: build against SP3 in OBS as well.\n- rpm/config.sh: ensure sorted patches.\n- rtc: interface: Validate alarm-time before handling rollover (bnc#1012382).\n- rtc: opal: Handle disabled TPO in opal_get_tpo_time() (bnc#1012382).\n- rtc: snvs: fix an incorrect check of return value (bnc#1012382).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bnc#1012382).\n- rxrpc: check return value of skb_to_sgvec always (bnc#1012382).\n- s390: add automatic detection of the spectre defense (bnc#1012382).\n- s390: add optimized array_index_mask_nospec (bnc#1012382).\n- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).\n- s390: add sysfs attributes for spectre (bnc#1012382).\n- s390/alternative: use a copy of the facility bit mask (bnc#1012382).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).\n- s390: correct module section names for expoline code revert (bnc#1012382).\n- s390: correct nospec auto detection init order (bnc#1012382).\n- s390/dasd: fix hanging safe offline (bnc#1012382).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093144, LTC#167398).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).\n- s390: enable CPU alternatives unconditionally (bnc#1012382).\n- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).\n- s390: introduce execute-trampolines for branches (bnc#1012382).\n- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).\n- s390: move _text symbol to address higher than zero (bnc#1012382).\n- s390/qdio: do not merge ERROR output buffers (bnc#1012382).\n- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).\n- s390/qeth: consolidate errno translation (bnc#1093144, LTC#167507).\n- s390/qeth: fix MAC address update sequence (bnc#1093144, LTC#167609).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, LTC#167507).\n- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).\n- s390: report spectre mitigation via syslog (bnc#1012382).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).\n- sched/numa: Use down_read_trylock() for the mmap_sem (bnc#1012382).\n- scsi: bnx2fc: fix race condition in bnx2fc_get_host_stats() (bnc#1012382).\n- scsi: libiscsi: Allow sd_shutdown on bad transport (bnc#1012382).\n- scsi: libsas: initialize sas_phy status according to response of DISCOVER (bnc#1012382).\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088865).\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088865).\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088865).\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088865).\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088865).\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088865).\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088865).\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088865).\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088865).\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088865).\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088865).\n- scsi: lpfc: Fix WQ/CQ creation for older asic\u0027s (bsc#1088865).\n- scsi: lpfc: update driver version to 11.4.0.7-2 (bsc#1088865).\n- scsi: mpt3sas: Proper handling of set/clear of \u0027ATA command pending\u0027 flag (bnc#1012382).\n- scsi: mptsas: Disable WRITE SAME (bnc#1012382).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).\n- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: do not leak kernel memory to user space (bnc#1012382).\n- sctp: fix recursive locking warning in sctp_do_peeloff (bnc#1012382).\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (bnc#1012382).\n- selftests/powerpc: Fix TM resched DSCR test with some compilers (bnc#1012382).\n- selinux: do not check open permission on sockets (bnc#1012382).\n- selinux: Remove redundant check for unknown labeling behavior (bnc#1012382).\n- selinux: Remove unnecessary check of array base in selinux_set_mapping() (bnc#1012382).\n- serial: 8250: omap: Disable DMA for console UART (bnc#1012382).\n- serial: mctrl_gpio: Add missing module license (bnc#1012382).\n- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).\n- serial: sh-sci: Fix race condition causing garbage during shutdown (bnc#1012382).\n- sh_eth: Use platform device for printing before register_netdev() (bnc#1012382).\n- sit: reload iphdr in ipip6_rcv (bnc#1012382).\n- skbuff: only inherit relevant tx_flags (bnc#1012382).\n- skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow (bnc#1012382).\n- sky2: Increase D3 delay to sky2 stops working after suspend (bnc#1012382).\n- slip: Check if rstate is initialized before uncompressing (bnc#1012382).\n- sparc64: ldc abort during vds iso boot (bnc#1012382).\n- spi: davinci: fix up dma_mapping_error() incorrect patch (bnc#1012382).\n- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bnc#1012382).\n- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).\n- staging: wlan-ng: prism2mgmt.c: fixed a double endian conversion before calling hfa384x_drvr_setconfig16, also fixes relative sparse warning (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tags: honor COMPILED_SOURCE with apart output directory (bnc#1012382).\n- tcp: better validation of received ack sequences (bnc#1012382).\n- tcp: do not read out-of-bounds opsize (bnc#1012382).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).\n- team: avoid adding twice the same option to the event list (bnc#1012382).\n- team: fix netconsole setup over team (bnc#1012382).\n- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).\n- thermal: power_allocator: fix one race condition issue for thermal_instances list (bnc#1012382).\n- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).\n- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).\n- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).\n- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bnc#1012382).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug \u0026 2 is not set (bnc#1012382).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).\n- tty: provide tty_name() even without CONFIG_TTY (bnc#1012382).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).\n- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).\n- ubi: Fix error for write access (bnc#1012382).\n- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).\n- ubi: Reject MLC NAND (bnc#1012382).\n- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).\n- Update config files, add expoline for s390x (bsc#1089393).\n- Update patches.suse/x86-nospectre_v2-means-nospec-too.patch (bsc#1075994 bsc#1075091 bnc#1085958).\n- usb: chipidea: properly handle host or gadget initialization failure (bnc#1012382).\n- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).\n- usb: dwc2: Improve gadget state disconnection handling (bnc#1012382).\n- usb: dwc3: keystone: check return value (bnc#1012382).\n- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).\n- usb: ene_usb6250: fix first command execution (bnc#1012382).\n- usb: ene_usb6250: fix SCSI residue overwriting (bnc#1012382).\n- usb:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).\n- usb: gadget: align buffer size when allocating for OUT endpoint (bnc#1012382).\n- usb: gadget: change len to size_t on alloc_ep_req() (bnc#1012382).\n- usb: gadget: define free_ep_req as universal function (bnc#1012382).\n- usb: gadget: f_hid: fix: Prevent accessing released memory (bnc#1012382).\n- usb: gadget: fix request length error for isoc transfer (git-fixes).\n- usb: gadget: fix usb_ep_align_maybe endianness and new usb_ep_align (bnc#1012382).\n- usb: Increment wakeup count on remote wakeup (bnc#1012382).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).\n- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).\n- usb: serial: cp210x: add ELDAT Easywave RX09 id (bnc#1012382).\n- usb: serial: cp210x: add ID for NI USB serial console (bnc#1012382).\n- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bnc#1012382).\n- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bnc#1012382).\n- usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).\n- usb: serial: simple: add libtransistor console (bnc#1012382).\n- vfb: fix video mode and line_length being set when loaded (bnc#1012382).\n- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).\n- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).\n- vfio-pci: Virtualize PCIe \u0026 AF FLR (bnc#1012382).\n- vhost: correctly remove wait queue during poll failure (bnc#1012382).\n- virtio: add ability to iterate over vqs (bnc#1012382).\n- virtio_console: free buffers after reset (bnc#1012382).\n- virtio_net: check return value of skb_to_sgvec always (bnc#1012382).\n- virtio_net: check return value of skb_to_sgvec in one more location (bnc#1012382).\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (bnc#1012382).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (bnc#1012382).\n- vmxnet3: ensure that adapter is in proper state during force_close (bnc#1012382).\n- vrf: Fix use after free and double free in vrf_finish_output (bnc#1012382).\n- vt: change SGR 21 to follow the standards (bnc#1012382).\n- vti6: better validate user provided tunnel names (bnc#1012382).\n- vxlan: dont migrate permanent fdb entries during learn (bnc#1012382).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- wl1251: check return from call to wl1251_acx_arp_ip_filter (bnc#1012382).\n- writeback: fix the wrong congested state variable definition (bnc#1012382).\n- writeback: safer lock nesting (bnc#1012382).\n- x86/asm: Do not use RBP as a temporary register in csum_partial_copy_generic() (bnc#1012382).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/hweight: Do not clobber %rdi (bnc#1012382).\n- x86/hweight: Get rid of the special calling convention (bnc#1012382).\n- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).\n- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263 #fate#322814).\n- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263\n- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).\n- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263 #fate#322814).\n- x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case (bsc#1089925).\n- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263 #fate#322814).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).\n- x86/tsc: Provide \u0027tsc=unstable\u0027 boot parameter (bnc#1012382).\n- xen: avoid type warning in xchg_xen_ulong (bnc#1012382).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xfrm: fix state migration copy replay sequence numbers (bnc#1012382).\n- xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems (bnc#1012382).\n- xfrm_user: uncoditionally validate esn replay attribute struct (bnc#1012382).\n- xfs: always verify the log tail during recovery (bsc#1036215).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).\n- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).\n- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-955,SUSE-SLE-HA-12-SP3-2018-955,SUSE-SLE-Live-Patching-12-SP3-2018-955,SUSE-SLE-SDK-12-SP3-2018-955,SUSE-SLE-SERVER-12-SP3-2018-955,SUSE-SLE-WE-12-SP3-2018-955",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1366-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1366-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1366-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html"
},
{
"category": "self",
"summary": "SUSE Bug 1005778",
"url": "https://bugzilla.suse.com/1005778"
},
{
"category": "self",
"summary": "SUSE Bug 1005780",
"url": "https://bugzilla.suse.com/1005780"
},
{
"category": "self",
"summary": "SUSE Bug 1005781",
"url": "https://bugzilla.suse.com/1005781"
},
{
"category": "self",
"summary": "SUSE Bug 1009062",
"url": "https://bugzilla.suse.com/1009062"
},
{
"category": "self",
"summary": "SUSE Bug 1012382",
"url": "https://bugzilla.suse.com/1012382"
},
{
"category": "self",
"summary": "SUSE Bug 1015336",
"url": "https://bugzilla.suse.com/1015336"
},
{
"category": "self",
"summary": "SUSE Bug 1015337",
"url": "https://bugzilla.suse.com/1015337"
},
{
"category": "self",
"summary": "SUSE Bug 1015340",
"url": "https://bugzilla.suse.com/1015340"
},
{
"category": "self",
"summary": "SUSE Bug 1015342",
"url": "https://bugzilla.suse.com/1015342"
},
{
"category": "self",
"summary": "SUSE Bug 1015343",
"url": "https://bugzilla.suse.com/1015343"
},
{
"category": "self",
"summary": "SUSE Bug 1022604",
"url": "https://bugzilla.suse.com/1022604"
},
{
"category": "self",
"summary": "SUSE Bug 1022743",
"url": "https://bugzilla.suse.com/1022743"
},
{
"category": "self",
"summary": "SUSE Bug 1024296",
"url": "https://bugzilla.suse.com/1024296"
},
{
"category": "self",
"summary": "SUSE Bug 1031492",
"url": "https://bugzilla.suse.com/1031492"
},
{
"category": "self",
"summary": "SUSE Bug 1036215",
"url": "https://bugzilla.suse.com/1036215"
},
{
"category": "self",
"summary": "SUSE Bug 1043598",
"url": "https://bugzilla.suse.com/1043598"
},
{
"category": "self",
"summary": "SUSE Bug 1044596",
"url": "https://bugzilla.suse.com/1044596"
},
{
"category": "self",
"summary": "SUSE Bug 1056415",
"url": "https://bugzilla.suse.com/1056415"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1060799",
"url": "https://bugzilla.suse.com/1060799"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1075087",
"url": "https://bugzilla.suse.com/1075087"
},
{
"category": "self",
"summary": "SUSE Bug 1075091",
"url": "https://bugzilla.suse.com/1075091"
},
{
"category": "self",
"summary": "SUSE Bug 1075994",
"url": "https://bugzilla.suse.com/1075994"
},
{
"category": "self",
"summary": "SUSE Bug 1076263",
"url": "https://bugzilla.suse.com/1076263"
},
{
"category": "self",
"summary": "SUSE Bug 1080157",
"url": "https://bugzilla.suse.com/1080157"
},
{
"category": "self",
"summary": "SUSE Bug 1082153",
"url": "https://bugzilla.suse.com/1082153"
},
{
"category": "self",
"summary": "SUSE Bug 1082299",
"url": "https://bugzilla.suse.com/1082299"
},
{
"category": "self",
"summary": "SUSE Bug 1082485",
"url": "https://bugzilla.suse.com/1082485"
},
{
"category": "self",
"summary": "SUSE Bug 1082962",
"url": "https://bugzilla.suse.com/1082962"
},
{
"category": "self",
"summary": "SUSE Bug 1083125",
"url": "https://bugzilla.suse.com/1083125"
},
{
"category": "self",
"summary": "SUSE Bug 1083635",
"url": "https://bugzilla.suse.com/1083635"
},
{
"category": "self",
"summary": "SUSE Bug 1083650",
"url": "https://bugzilla.suse.com/1083650"
},
{
"category": "self",
"summary": "SUSE Bug 1083900",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "self",
"summary": "SUSE Bug 1084721",
"url": "https://bugzilla.suse.com/1084721"
},
{
"category": "self",
"summary": "SUSE Bug 1085058",
"url": "https://bugzilla.suse.com/1085058"
},
{
"category": "self",
"summary": "SUSE Bug 1085185",
"url": "https://bugzilla.suse.com/1085185"
},
{
"category": "self",
"summary": "SUSE Bug 1085511",
"url": "https://bugzilla.suse.com/1085511"
},
{
"category": "self",
"summary": "SUSE Bug 1085958",
"url": "https://bugzilla.suse.com/1085958"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1088242",
"url": "https://bugzilla.suse.com/1088242"
},
{
"category": "self",
"summary": "SUSE Bug 1088865",
"url": "https://bugzilla.suse.com/1088865"
},
{
"category": "self",
"summary": "SUSE Bug 1089023",
"url": "https://bugzilla.suse.com/1089023"
},
{
"category": "self",
"summary": "SUSE Bug 1089115",
"url": "https://bugzilla.suse.com/1089115"
},
{
"category": "self",
"summary": "SUSE Bug 1089198",
"url": "https://bugzilla.suse.com/1089198"
},
{
"category": "self",
"summary": "SUSE Bug 1089393",
"url": "https://bugzilla.suse.com/1089393"
},
{
"category": "self",
"summary": "SUSE Bug 1089608",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1089752",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "self",
"summary": "SUSE Bug 1089895",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "self",
"summary": "SUSE Bug 1089925",
"url": "https://bugzilla.suse.com/1089925"
},
{
"category": "self",
"summary": "SUSE Bug 1090225",
"url": "https://bugzilla.suse.com/1090225"
},
{
"category": "self",
"summary": "SUSE Bug 1090643",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "self",
"summary": "SUSE Bug 1090658",
"url": "https://bugzilla.suse.com/1090658"
},
{
"category": "self",
"summary": "SUSE Bug 1090663",
"url": "https://bugzilla.suse.com/1090663"
},
{
"category": "self",
"summary": "SUSE Bug 1090708",
"url": "https://bugzilla.suse.com/1090708"
},
{
"category": "self",
"summary": "SUSE Bug 1090718",
"url": "https://bugzilla.suse.com/1090718"
},
{
"category": "self",
"summary": "SUSE Bug 1090734",
"url": "https://bugzilla.suse.com/1090734"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1091325",
"url": "https://bugzilla.suse.com/1091325"
},
{
"category": "self",
"summary": "SUSE Bug 1091728",
"url": "https://bugzilla.suse.com/1091728"
},
{
"category": "self",
"summary": "SUSE Bug 1091925",
"url": "https://bugzilla.suse.com/1091925"
},
{
"category": "self",
"summary": "SUSE Bug 1091960",
"url": "https://bugzilla.suse.com/1091960"
},
{
"category": "self",
"summary": "SUSE Bug 1092289",
"url": "https://bugzilla.suse.com/1092289"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1092566",
"url": "https://bugzilla.suse.com/1092566"
},
{
"category": "self",
"summary": "SUSE Bug 1092904",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "self",
"summary": "SUSE Bug 1093008",
"url": "https://bugzilla.suse.com/1093008"
},
{
"category": "self",
"summary": "SUSE Bug 1093144",
"url": "https://bugzilla.suse.com/1093144"
},
{
"category": "self",
"summary": "SUSE Bug 1093215",
"url": "https://bugzilla.suse.com/1093215"
},
{
"category": "self",
"summary": "SUSE Bug 1094019",
"url": "https://bugzilla.suse.com/1094019"
},
{
"category": "self",
"summary": "SUSE Bug 802154",
"url": "https://bugzilla.suse.com/802154"
},
{
"category": "self",
"summary": "SUSE Bug 966170",
"url": "https://bugzilla.suse.com/966170"
},
{
"category": "self",
"summary": "SUSE Bug 966172",
"url": "https://bugzilla.suse.com/966172"
},
{
"category": "self",
"summary": "SUSE Bug 966186",
"url": "https://bugzilla.suse.com/966186"
},
{
"category": "self",
"summary": "SUSE Bug 966191",
"url": "https://bugzilla.suse.com/966191"
},
{
"category": "self",
"summary": "SUSE Bug 969476",
"url": "https://bugzilla.suse.com/969476"
},
{
"category": "self",
"summary": "SUSE Bug 969477",
"url": "https://bugzilla.suse.com/969477"
},
{
"category": "self",
"summary": "SUSE Bug 981348",
"url": "https://bugzilla.suse.com/981348"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000199 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1065 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5803 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7492 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8781 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8781/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-05-22T11:33:23Z",
"generator": {
"date": "2018-05-22T11:33:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1366-1",
"initial_release_date": "2018-05-22T11:33:23Z",
"revision_history": [
{
"date": "2018-05-22T11:33:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-4.4.131-94.29.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.131-94.29.1.aarch64",
"product_id": "kernel-obs-build-4.4.131-94.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.131-94.29.1.aarch64",
"product": {
"name": "kernel-default-4.4.131-94.29.1.aarch64",
"product_id": "kernel-default-4.4.131-94.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.131-94.29.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.131-94.29.1.aarch64",
"product_id": "kernel-default-base-4.4.131-94.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.131-94.29.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.131-94.29.1.aarch64",
"product_id": "kernel-default-devel-4.4.131-94.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.131-94.29.1.aarch64",
"product": {
"name": "kernel-syms-4.4.131-94.29.1.aarch64",
"product_id": "kernel-syms-4.4.131-94.29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.131-94.29.1.noarch",
"product": {
"name": "kernel-devel-4.4.131-94.29.1.noarch",
"product_id": "kernel-devel-4.4.131-94.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.131-94.29.1.noarch",
"product": {
"name": "kernel-macros-4.4.131-94.29.1.noarch",
"product_id": "kernel-macros-4.4.131-94.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.131-94.29.1.noarch",
"product": {
"name": "kernel-source-4.4.131-94.29.1.noarch",
"product_id": "kernel-source-4.4.131-94.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.131-94.29.1.noarch",
"product": {
"name": "kernel-docs-4.4.131-94.29.1.noarch",
"product_id": "kernel-docs-4.4.131-94.29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"product": {
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"product_id": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.131-94.29.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.131-94.29.1.ppc64le",
"product_id": "kernel-obs-build-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.131-94.29.1.ppc64le",
"product": {
"name": "kernel-default-4.4.131-94.29.1.ppc64le",
"product_id": "kernel-default-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.131-94.29.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.131-94.29.1.ppc64le",
"product_id": "kernel-default-base-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.131-94.29.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.131-94.29.1.ppc64le",
"product_id": "kernel-default-devel-4.4.131-94.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.131-94.29.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.131-94.29.1.ppc64le",
"product_id": "kernel-syms-4.4.131-94.29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.131-94.29.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.131-94.29.1.s390x",
"product_id": "dlm-kmp-default-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.131-94.29.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.s390x",
"product_id": "gfs2-kmp-default-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.131-94.29.1.s390x",
"product_id": "kernel-obs-build-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-default-4.4.131-94.29.1.s390x",
"product_id": "kernel-default-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-default-base-4.4.131-94.29.1.s390x",
"product_id": "kernel-default-base-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.131-94.29.1.s390x",
"product_id": "kernel-default-devel-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-default-man-4.4.131-94.29.1.s390x",
"product_id": "kernel-default-man-4.4.131-94.29.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.131-94.29.1.s390x",
"product": {
"name": "kernel-syms-4.4.131-94.29.1.s390x",
"product_id": "kernel-syms-4.4.131-94.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-default-4.4.131-94.29.1.x86_64",
"product_id": "kernel-default-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.131-94.29.1.x86_64",
"product_id": "kernel-default-devel-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.131-94.29.1.x86_64",
"product_id": "kernel-default-extra-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-syms-4.4.131-94.29.1.x86_64",
"product_id": "kernel-syms-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.131-94.29.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.131-94.29.1.x86_64",
"product_id": "dlm-kmp-default-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"product": {
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"product_id": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.131-94.29.1.x86_64",
"product_id": "kernel-obs-build-4.4.131-94.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.131-94.29.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.131-94.29.1.x86_64",
"product_id": "kernel-default-base-4.4.131-94.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-devel-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-macros-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-source-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le"
},
"product_reference": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-docs-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-obs-build-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-obs-build-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-obs-build-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-man-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-devel-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-macros-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-source-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-default-man-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-devel-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-macros-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch"
},
"product_reference": "kernel-source-4.4.131-94.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-syms-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
},
"product_reference": "kernel-default-extra-4.4.131-94.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-1000199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000199"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000199",
"url": "https://www.suse.com/security/cve/CVE-2018-1000199"
},
{
"category": "external",
"summary": "SUSE Bug 1089895 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1089895"
},
{
"category": "external",
"summary": "SUSE Bug 1090036 for CVE-2018-1000199",
"url": "https://bugzilla.suse.com/1090036"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "important"
}
],
"title": "CVE-2018-1000199"
},
{
"cve": "CVE-2018-10087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10087"
}
],
"notes": [
{
"category": "general",
"text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10087",
"url": "https://www.suse.com/security/cve/CVE-2018-10087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089608 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-10087"
},
{
"cve": "CVE-2018-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10124"
}
],
"notes": [
{
"category": "general",
"text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10124",
"url": "https://www.suse.com/security/cve/CVE-2018-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089752 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-10124"
},
{
"cve": "CVE-2018-1065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1065"
}
],
"notes": [
{
"category": "general",
"text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1065",
"url": "https://www.suse.com/security/cve/CVE-2018-1065"
},
{
"category": "external",
"summary": "SUSE Bug 1083650 for CVE-2018-1065",
"url": "https://bugzilla.suse.com/1083650"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1065",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-1065"
},
{
"cve": "CVE-2018-1130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1130"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1130",
"url": "https://www.suse.com/security/cve/CVE-2018-1130"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2018-1130",
"url": "https://bugzilla.suse.com/1092904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "low"
}
],
"title": "CVE-2018-1130"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5803",
"url": "https://www.suse.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "SUSE Bug 1083900 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "low"
}
],
"title": "CVE-2018-5803"
},
{
"cve": "CVE-2018-7492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7492"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7492",
"url": "https://www.suse.com/security/cve/CVE-2018-7492"
},
{
"category": "external",
"summary": "SUSE Bug 1082962 for CVE-2018-7492",
"url": "https://bugzilla.suse.com/1082962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-7492"
},
{
"cve": "CVE-2018-8781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8781"
}
],
"notes": [
{
"category": "general",
"text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8781",
"url": "https://www.suse.com/security/cve/CVE-2018-8781"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090643 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "external",
"summary": "SUSE Bug 1090646 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-22T11:33:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-8781"
}
]
}
SUSE-SU-2018:1362-1
Vulnerability from csaf_suse - Published: 2018-05-21 21:11 - Updated: 2018-05-21 21:11Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\nThis feature was added:\n\n- Add support for block resize support for xen disks through the monitor\n\nThis non-security issue was fixed:\n\n- bsc#1079405: Add new look up path \u0027sys/class/tpm\u0027 for tpm cancel path based\n on Linux 4.0 change\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-946,SUSE-SLE-SAP-12-SP2-2018-946,SUSE-SLE-SERVER-12-SP2-2018-946,SUSE-Storage-4-2018-946",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1362-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1362-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181362-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1362-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html"
},
{
"category": "self",
"summary": "SUSE Bug 1079405",
"url": "https://bugzilla.suse.com/1079405"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-21T21:11:41Z",
"generator": {
"date": "2018-05-21T21:11:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1362-1",
"initial_release_date": "2018-05-21T21:11:41Z",
"revision_history": [
{
"date": "2018-05-21T21:11:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.40.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch",
"product_id": "qemu-ipxe-1.0.0-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.40.1.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch",
"product_id": "qemu-seabios-1.9.1-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.40.1.noarch",
"product": {
"name": "qemu-sgabios-8-41.40.1.noarch",
"product_id": "qemu-sgabios-8-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.40.1.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch",
"product_id": "qemu-vgabios-1.9.1-41.40.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-block-curl-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-block-ssh-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-guest-agent-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-lang-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-lang-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-ppc-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-ppc-2.6.2-41.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.40.1.ppc64le",
"product": {
"name": "qemu-tools-2.6.2-41.40.1.ppc64le",
"product_id": "qemu-tools-2.6.2-41.40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-2.6.2-41.40.1.s390x",
"product_id": "qemu-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-block-curl-2.6.2-41.40.1.s390x",
"product_id": "qemu-block-curl-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-block-ssh-2.6.2-41.40.1.s390x",
"product_id": "qemu-block-ssh-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-guest-agent-2.6.2-41.40.1.s390x",
"product_id": "qemu-guest-agent-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-kvm-2.6.2-41.40.1.s390x",
"product_id": "qemu-kvm-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-lang-2.6.2-41.40.1.s390x",
"product_id": "qemu-lang-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-s390-2.6.2-41.40.1.s390x",
"product_id": "qemu-s390-2.6.2-41.40.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.40.1.s390x",
"product": {
"name": "qemu-tools-2.6.2-41.40.1.s390x",
"product_id": "qemu-tools-2.6.2-41.40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-2.6.2-41.40.1.x86_64",
"product_id": "qemu-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64",
"product_id": "qemu-kvm-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64",
"product_id": "qemu-lang-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64",
"product_id": "qemu-tools-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64",
"product_id": "qemu-x86-2.6.2-41.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.40.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.40.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.40.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-sgabios-8-41.40.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.40.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.40.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.40.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.40.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.40.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.40.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.40.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.40.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-sgabios-8-41.40.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.40.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-21T21:11:41Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1456-1
Vulnerability from csaf_suse - Published: 2018-05-29 05:35 - Updated: 2018-05-29 05:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for xen fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-3639: Spectre V4 \u2013 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092631)\n\n This feature can be controlled by the \u0027ssbd=on/off\u0027 commandline flag for the XEN hypervisor.\n- CVE-2018-10982: x86 vHPET interrupt injection errors (XSA-261 bsc#1090822)\n- CVE-2018-10981: qemu may drive Xen into unbounded loop (XSA-262 bsc#1090823) \n\nOther bugfixes:\n\n- Upstream patches from Jan (bsc#1027519)\n- additional fixes related to Page Table Isolation (XPTI). (bsc#1074562 XSA-254)\n- qemu-system-i386 cannot handle more than 4 HW NICs (bsc#1090296)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-996,SUSE-SLE-SDK-12-SP3-2018-996,SUSE-SLE-SERVER-12-SP3-2018-996",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1456-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1456-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181456-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1456-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1090296",
"url": "https://bugzilla.suse.com/1090296"
},
{
"category": "self",
"summary": "SUSE Bug 1090822",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "self",
"summary": "SUSE Bug 1090823",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10981 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10982 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-05-29T05:35:57Z",
"generator": {
"date": "2018-05-29T05:35:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1456-1",
"initial_release_date": "2018-05-29T05:35:57Z",
"revision_history": [
{
"date": "2018-05-29T05:35:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.9.2_06-3.32.1.aarch64",
"product": {
"name": "xen-devel-4.9.2_06-3.32.1.aarch64",
"product_id": "xen-devel-4.9.2_06-3.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-libs-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-libs-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-devel-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-devel-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-doc-html-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-doc-html-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-tools-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-tools-4.9.2_06-3.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"product": {
"name": "xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"product_id": "xen-tools-domU-4.9.2_06-3.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.9.2_06-3.32.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64"
},
"product_reference": "xen-devel-4.9.2_06-3.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-devel-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-tools-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-tools-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.2_06-3.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-10981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10981"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10981",
"url": "https://www.suse.com/security/cve/CVE-2018-10981"
},
{
"category": "external",
"summary": "SUSE Bug 1090823 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1090823"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10981",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-29T05:35:57Z",
"details": "moderate"
}
],
"title": "CVE-2018-10981"
},
{
"cve": "CVE-2018-10982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10982"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10982",
"url": "https://www.suse.com/security/cve/CVE-2018-10982"
},
{
"category": "external",
"summary": "SUSE Bug 1090822 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1090822"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-10982",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-29T05:35:57Z",
"details": "important"
}
],
"title": "CVE-2018-10982"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.2_06-3.32.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:xen-devel-4.9.2_06-3.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-29T05:35:57Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2092-1
Vulnerability from csaf_suse - Published: 2018-07-27 13:37 - Updated: 2018-07-27 13:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following new feature was added:\n\n- NVDIMM memory error notification (ACPI 6.2)\n\nThe following security bugs were fixed:\n\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could\n have result in local attackers being able to crash the kernel or potentially\n elevate privileges because kmalloc_array is not used (bnc#1100418)\n- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a\n large relative timeout because ktime_add_safe was not used (bnc#1099924)\n- CVE-2018-9385: Prevent overread of the \u0027driver_override\u0027 buffer (bsc#1100491)\n- CVE-2018-13405: The inode_init_owner function allowed local users to create\n files with an unintended group ownership allowing attackers to escalate\n privileges by making a plain file executable and SGID (bnc#1100416)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution\n and branch prediction may have allowed unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis (bsc#1068032)\n- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in\n messages passed between virtual guests and the host operating system. This\n could have allowed local privileged users to read some kernel memory contents\n when reading from the /dev/vhost-net device file (bsc#1092472)\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082)\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory\n containing command line arguments (or environment strings), an attacker could\n have caused utilities from psutils or procps (such as ps, w) to block\n indefinitely (denial of service) or for some controlled time (as a\n synchronization primitive for other attacks) (bsc#1093158)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- 1093: The ext4_valid_block_bitmap function allowed attackers to cause a\n denial of service (out-of-bounds read and system crash) via a crafted ext4\n image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1000200: Prevent NULL pointer dereference which could have resulted\n in an out of memory (OOM) killing of large mlocked processes (bsc#1090150)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might\n have allowed local users to cause a denial of service via an INT_MIN argument\n (bnc#1089752)\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed\n local users to cause a denial of service by triggering an attempted use of the\n-INT_MIN value (bnc#1089608)\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1068032)\n\nThe following non-security bugs were fixed:\n\n- Fix copy_in_user() declaration (bsc#1052766).\n- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510).\n- 8021q: fix a memory leak for VLAN 0 device (networking-stable-18_01_12).\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15).\n- 8139too: revisit napi_complete_done() usage (networking-stable-17_10_09).\n- 9p/trans_virtio: discard zero-length reply (bsc#1052766).\n- ACPI / APEI: Replace ioremap_page_range() with fixmap (bsc#1051510).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510).\n- ACPI / NUMA: ia64: Parse all entries of SRAT memory affinity table (bnc#1088796).\n- ACPI / bus: Do not call _STA on battery devices with unmet dependencies (bsc#1051510).\n- ACPI / button: make module loadable when booted in non-ACPI mode (bsc#1051510).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bsc#1051510).\n- ACPI / scan: Initialize watchdog before PNP (bsc#1073960).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / scan: Use acpi_bus_get_status() to initialize ACPI_TYPE_DEVICE devs (bsc#1051510).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bsc#1051510).\n- ACPI / video: Default lcd_only to true on Win8-ready and newer machines (bsc#1051510).\n- ACPI / video: Only default only_lcd to true on Win8-ready _desktops_ (bsc#1051510).\n- ACPI / watchdog: Prefer iTCO_wdt on Lenovo Z50-70 (bsc#1051510).\n- ACPI / watchdog: properly initialize resources (bsc#1051510).\n- ACPI: EC: Fix debugfs_create_*() usage (bsc#1051510).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bsc#1051510).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bsc#1051510).\n- ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs (bsc#1051510).\n- ACPICA: ACPI 6.0A: Changes to the NFIT ACPI table (bsc#1091424).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bsc#1051510).\n- ACPICA: Fix memory leak on unusual memory leak (bsc#1051510).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bsc#1051510).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bsc#1051510).\n- ALSA: aloop: Mark paused device as inactive (bsc#1051510).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: caiaq: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: control: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: control: fix a redundant-copy issue (bsc#1051510).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bsc#1051510).\n- ALSA: dice: fix OUI for TC group (bsc#1051510).\n- ALSA: dice: fix error path to destroy initialized stream data (bsc#1051510).\n- ALSA: dice: fix kernel NULL pointer dereference due to invalid calculation for array index (bsc#1051510).\n- ALSA: emu10k1: Fix kABI breakage (bsc#1093027).\n- ALSA: emu10k1: add a IOMMU workaround (bsc#1093027).\n- ALSA: emu10k1: add optional debug printouts with DMA addresses (bsc#1093027).\n- ALSA: emu10k1: make sure synth DMA pages are allocated with DMA functions (bsc#1093027).\n- ALSA: emu10k1: remove reserved_page (bsc#1093027).\n- ALSA: emu10k1: use dma_set_mask_and_coherent() (bsc#1093027).\n- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1051510).\n- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bsc#1051510).\n- ALSA: hda - New VIA controller suppor no-snoop path (bsc#1051510).\n- ALSA: hda - Skip jack and others for non-existing PCM streams (bsc#1051510).\n- ALSA: hda/ca0132 - use ARRAY_SIZE (bsc#1051510).\n- ALSA: hda/ca0132: Add DSP Volume set and New mixers for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add PCI region2 iomap for SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add dsp setup + gpio functions for r3di (bsc#1096696).\n- ALSA: hda/ca0132: Add extra exit functions for R3Di and SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add new control changes for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add pincfg for SBZ + R3Di, add fp hp auto-detect (bsc#1096696).\n- ALSA: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510).\n- ALSA: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510).\n- ALSA: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510).\n- ALSA: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510).\n- ALSA: hda/ca0132: R3Di and SBZ quirk entires + alt firmware loading (bsc#1096696).\n- ALSA: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510).\n- ALSA: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510).\n- ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ (bsc#1096696).\n- ALSA: hda/ca0132: add ca0132_alt_set_vipsource (bsc#1096696).\n- ALSA: hda/ca0132: add dsp setup related commands for the sbz (bsc#1096696).\n- ALSA: hda/ca0132: add extra init functions for r3di + sbz (bsc#1096696).\n- ALSA: hda/ca0132: add the ability to set src_id on scp commands (bsc#1096696).\n- ALSA: hda/ca0132: constify parameter table for effects (bsc#1096696).\n- ALSA: hda/ca0132: constify read-only members of string array (bsc#1096696).\n- ALSA: hda/ca0132: constify templates for control element set (bsc#1096696).\n- ALSA: hda/ca0132: fix array_size.cocci warnings (bsc#1096696).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1051510).\n- ALSA: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510).\n- ALSA: hda/ca0132: merge strings just for printk (bsc#1096696).\n- ALSA: hda/ca0132: update core functions for sbz + r3di (bsc#1096696).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/conexant - Add hp-mic-fix model string (bsc#1092975).\n- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510).\n- ALSA: hda/realtek - Add shutup hint (bsc#1051510).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bsc#1051510).\n- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1051510).\n- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1051510).\n- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510).\n- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1096705).\n- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1096705).\n- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1096705).\n- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1051510).\n- ALSA: hda/realtek - adjust the location of one mic (bsc#1051510).\n- ALSA: hda/realtek - change the location for one of two front mics (bsc#1051510).\n- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1051510).\n- ALSA: hda: Add ASRock H81M-HDS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Clevo W35xSS_370SS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Gigabyte P55A-UD3 and Z87-D3HP to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Icelake PCI ID (bsc#1051510).\n- ALSA: hda: Add Intel NUC5i7RY to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Intel NUC7i3BNB to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1051510).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hiface: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Use correct endpoint type for midi output (bsc#1051510).\n- ALSA: line6: add support for POD HD DESKTOP (bsc#1051510).\n- ALSA: line6: add support for POD HD500X (bsc#1051510).\n- ALSA: line6: remove unnecessary initialization to PODHD500X (bsc#1051510).\n- ALSA: opl3: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bsc#1051510).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bsc#1051510).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bsc#1051510).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bsc#1051510).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bsc#1051510).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bsc#1051510).\n- ALSA: pcm: potential uninitialized return values (bsc#1051510).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bsc#1051510).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bsc#1051510).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bsc#1051510).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510).\n- ALSA: timer: Fix pause event notification (bsc#1051510).\n- ALSA: usb-audio: Add \u0027Keep Interface\u0027 control (bsc#1089467).\n- ALSA: usb-audio: Add a quirk for Nura\u0027s first gen headset (bsc#1051510).\n- ALSA: usb-audio: Add keep_iface flag (bsc#1089467).\n- ALSA: usb-audio: Add native DSD support for Luxman DA-06 (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for Mytek DACs (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for TEAC UD-301 (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics C310/C520-M (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics P610 (bsc#1051510).\n- ALSA: usb-audio: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usb-audio: Allow to override the longname string (bsc#1091678).\n- ALSA: usb-audio: Apply vendor ID matching for sample rate quirk (bsc#1051510).\n- ALSA: usb-audio: Avoid superfluous usb_set_interface() calls (bsc#1089467).\n- ALSA: usb-audio: Change the semantics of the enable option (bsc#1051510).\n- ALSA: usb-audio: Disable the quirk for Nura headset (bsc#1051510).\n- ALSA: usb-audio: FIX native DSD support for TEAC UD-501 DAC (bsc#1051510).\n- ALSA: usb-audio: Generic DSD detection for XMOS-based implementations (bsc#1051510).\n- ALSA: usb-audio: Give proper vendor/product name for Dell WD15 Dock (bsc#1091678).\n- ALSA: usb-audio: Initialize Dell Dock playback volumes (bsc#1089467).\n- ALSA: usb-audio: Integrate native DSD support for ITF-USB based DACs (bsc#1051510).\n- ALSA: usb-audio: Remove explicitly listed Mytek devices (bsc#1051510).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb-audio: Support changing input on Sound Blaster E1 (bsc#1051510).\n- ALSA: usb-audio: add boot quirk for Axe-Fx III (bsc#1051510).\n- ALSA: usb-audio: add more quirks for DSD interfaces (bsc#1051510).\n- ALSA: usb-audio: simplify set_sync_ep_implicit_fb_quirk (bsc#1051510).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bsc#1051510).\n- ALSA: usx2y: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usx2y: Fix invalid stream URBs (bsc#1051510).\n- ALSA: vmaster: Propagate slave error (bsc#1051510).\n- ASoC: Intel: Skylake: Disable clock gating during firmware and library download (bsc#1051510).\n- ASoC: Intel: cht_bsw_rt5645: Analog Mic support (bsc#1051510).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bsc#1051510).\n- ASoC: adau17x1: Handling of DSP_RUN register during fw setup (bsc#1051510).\n- ASoC: cirrus: i2s: Fix LRCLK configuration (bsc#1051510).\n- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510).\n- ASoC: cs35l35: Add use_single_rw to regmap config (bsc#1051510).\n- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bsc#1051510).\n- ASoC: hdmi-codec: Fix module unloading caused kernel crash (bsc#1051510).\n- ASoC: hdmi-codec: fix spelling mistake: \u0027deteced\u0027 -\u003e \u0027detected\u0027 (bsc#1051510).\n- ASoC: hdmi-codec: remove multi detection support (bsc#1051510).\n- ASoC: omap: Remove OMAP_MUX dependency from Nokia N810 audio support (bsc#1051510).\n- ASoC: rockchip: Fix dai_name for HDMI codec (bsc#1051510).\n- ASoC: rockchip: rk3288-hdmi-analog: Select needed codecs (bsc#1051510).\n- ASoC: rsnd: mark PM functions __maybe_unused (bsc#1051510).\n- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bsc#1051510).\n- ASoC: samsung: odroid: Drop requirement of clocks in the sound node (bsc#1051510).\n- ASoC: samsung: odroid: Fix 32000 sample rate handling (bsc#1051510).\n- ASoC: samsung: odroid: Fix EPLL frequency values (bsc#1051510).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Fix bugs of freeing soc topology (bsc#1051510).\n- ASoC: topology: Fix kcontrol name string handling (bsc#1051510).\n- ASoC: topology: create TLV data for dapm widgets (bsc#1051510).\n- ASoC: topology: fix some tiny memory leaks (bsc#1051510).\n- Bluetooth: Add a new 04ca:3015 QCA_ROME device (bsc#1051510).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504).\n- Bluetooth: Fix missing encryption refresh on Security Request (bsc#1051510).\n- Bluetooth: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for BTUSB_QCA_ROME (bsc#1051510).\n- Bluetooth: btrtl: Fix a error code in rtl_load_config() (bsc#1051510).\n- Bluetooth: btusb: Add Dell XPS 13 9360 to btusb_needs_reset_resume_table (bsc#1051510).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bsc#1051510).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bsc#1051510).\n- Bluetooth: btusb: Only check needs_reset_resume DMI table for QCA rome chipsets (bsc#1051510).\n- Bluetooth: btusb: add ID for LiteOn 04ca:3016 (bsc#1051510).\n- Bluetooth: hci_bcm: Add 6 new ACPI HIDs (bsc#1051510).\n- Bluetooth: hci_bcm: Add active_low irq polarity quirk for Asus T100CHI (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for BCM2E72 (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for MINIX Z83-4 based devices (bsc#1051510).\n- Bluetooth: hci_bcm: Fix setting of irq trigger type (bsc#1051510).\n- Bluetooth: hci_bcm: Handle empty packet after firmware loading (bsc#1051510).\n- Bluetooth: hci_bcm: Make bcm_request_irq fail if no IRQ resource (bsc#1051510).\n- Bluetooth: hci_bcm: Remove DMI quirk for the MINIX Z83-4 (bsc#1051510).\n- Bluetooth: hci_bcm: Treat Interrupt ACPI resources as always being active-low (bsc#1051510).\n- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510).\n- Btrfs: fix copy_items() return value when logging an inode (bsc#1097105).\n- Btrfs: fix xattr loss after power failure (bsc#1097105).\n- Btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918).\n- Correct bug reference in the patch (bnc#1095155)\n- Delete patches.arch/powerpc64-ftrace-Use-the-generic-version-of-ftrace_r.patch (bsc#1088804).\n- Downgrade printk level for MMC SDHCI host version error (bsc#1097941).\n- Fix kABI breakage due to acpi_ec gpe field change (bsc#1051510).\n- Fix kABI breakage due to snd_usb_audio_quirk profile_name addition (bsc#1091678).\n- Fix kABI breakage due to sound/timer.h inclusion (bsc#1051510).\n- Fix kABI breakage for iwl_fw_runtime_ops change (bsc#1051510).\n- Fix kABI breakage for iwlwifi (bsc#1051510).\n- Fix kABI breakage of iio_buffer (bsc#1051510).\n- Fix kABI incompatibility by snd_pcm_oss_runtime.rw_ref addition (bsc#1051510).\n- Fix the build error in adau17x1 soc driver (bsc#1051510)\n- Fix the build of da9063_wdt module (bsc#1100843) Backport the missing prerequisite commit, move the previous fixes into the sorted section and refresh.\n- GFS2: Take inode off order_write list when setting jdata flag (bsc#1052766).\n- HID: add backlight level quirk for Asus ROG laptops (bsc#1101324).\n- HID: cp2112: fix broken gpio_direction_input callback (bsc#1051510).\n- HID: debug: check length before copy_to_user() (bsc#1051510).\n- HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bsc#1051510).\n- HID: i2c-hid: Fix \u0027incomplete report\u0027 noise (bsc#1051510).\n- HID: i2c-hid: fix size check and type usage (bsc#1051510).\n- HID: intel-ish-hid: Enable Gemini Lake ish driver (bsc#1073765,).\n- HID: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510).\n- HID: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510).\n- HID: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1051510).\n- HID: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633).\n- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510).\n- HID: wacom: EKR: ensure devres groups at higher indexes are released (bsc#1051510).\n- HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (bsc#1051510).\n- HID: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510).\n- HID: wacom: bluetooth: send exit report for recent Bluetooth devices (bsc#1051510).\n- IB/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793).\n- IB/core: Generate GID change event regardless of RoCE GID table property (bsc#1046306).\n- IB/core: Refer to RoCE port property instead of GID table property (bsc#1046306).\n- IB/cq: Do not force IB_POLL_DIRECT poll context for ib_process_cq_direct (bsc#1046306).\n- IB/hfi1 Use correct type for num_user_context (bsc#1096793).\n- IB/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793).\n- IB/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793).\n- IB/hfi1: Complete check for locally terminated smp (bsc#1096793).\n- IB/hfi1: Compute BTH only for RDMA_WRITE_LAST/SEND_LAST packet (bsc#1096793).\n- IB/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793).\n- IB/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793).\n- IB/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793).\n- IB/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793).\n- IB/hfi1: Do not override given pcie_pset value (bsc#1096793).\n- IB/hfi1: Ensure VL index is within bounds (bsc#1096793).\n- IB/hfi1: Fix NULL pointer dereference when invalid num_vls is used (bsc#1060463).\n- IB/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793).\n- IB/hfi1: Fix for early release of sdma context (bsc#1096793).\n- IB/hfi1: Fix handling of FECN marked multicast packet (bsc#1060463).\n- IB/hfi1: Fix loss of BECN with AHG (bsc#1096793).\n- IB/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793).\n- IB/hfi1: Fix serdes loopback set-up (bsc#1096793).\n- IB/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793).\n- IB/hfi1: Inline common calculation (bsc#1096793).\n- IB/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793).\n- IB/hfi1: Look up ibport using a pointer in receive path (bsc#1096793).\n- IB/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793).\n- IB/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793).\n- IB/hfi1: Prevent LNI hang when LCB can\u0027t obtain lanes (bsc#1096793).\n- IB/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793).\n- IB/hfi1: Race condition between user notification and driver state (bsc#1096793).\n- IB/hfi1: Re-order IRQ cleanup to address driver cleanup race (bsc#1060463).\n- IB/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793).\n- IB/hfi1: Refactor get_base_info (bsc#1096793).\n- IB/hfi1: Refactor get_ctxt_info (bsc#1096793).\n- IB/hfi1: Refactor get_user() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793).\n- IB/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793).\n- IB/hfi1: Reorder incorrect send context disable (bsc#1096793).\n- IB/hfi1: Return correct value for device state (bsc#1096793).\n- IB/hfi1: Send \u0027reboot\u0027 as planned down remote reason (bsc#1096793).\n- IB/hfi1: Set port number for errorinfo MAD response (bsc#1096793).\n- IB/hfi1: Show fault stats in both TX and RX directions (bsc#1096793).\n- IB/hfi1: Update HFI to use the latest PCI API (bsc#1096793).\n- IB/hfi1: Use after free race condition in send context error path (bsc#1096793).\n- IB/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793).\n- IB/ipoib: Avoid memory leak if the SA returns a different DGID (bsc#1046307).\n- IB/ipoib: Change number of TX wqe to 64 (bsc#1096793).\n- IB/ipoib: Fix for notify send CQ failure messages (bsc#1096793).\n- IB/ipoib: Fix for potential no-carrier state (bsc#1046307).\n- IB/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793).\n- IB/ipoib: Use NAPI in UD/TX flows (bsc#1096793).\n- IB/mlx4: Fix integer overflow when calculating optimal MTT size (bsc#1071218).\n- IB/mlx4: Move mlx4_uverbs_ex_query_device_resp to include/uapi/ (bsc#1071218).\n- IB/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (bsc#1046305).\n- IB/mlx5: Respect new UMR capabilities (bsc#1093205).\n- IB/mlx5: Set the default active rate and width to QDR and 4X (bsc#1046305).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bsc#1046305).\n- IB/mlx5:: pr_err() and mlx5_ib_dbg() strings should end with newlines (bsc#1093205).\n- IB/rdmavt: Add trace for RNRNAK timer (bsc#1096793).\n- IB/rdmavt: Allocate CQ memory on the correct node (bsc#1058717).\n- IB/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793).\n- IB/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793).\n- IB/srp: Fix completion vector assignment algorithm (bsc#1046306).\n- IB/srp: Fix srp_abort() (bsc#1046306).\n- IB/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bsc#1046306).\n- IB/uverbs: Fix validating mandatory attributes (bsc#1046306).\n- IB/{hfi1, qib}: Add handling of kernel restart (bsc#1096793).\n- IB/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793).\n- IB/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793).\n- Input: ALPS - fix TrackStick detection on Thinkpad L570 and Latitude 7370 (bsc#1051510).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bsc#1051510).\n- Input: atmel_mxt_ts - fix the firmware update (bsc#1051510).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c_smbus - fix corrupted stack (bsc#1051510).\n- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510).\n- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510).\n- Input: elantech - fix V4 report decoding for module with middle key (bsc#1051510).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bsc#1051510).\n- Input: goodix - disable IRQs while suspended (bsc#1051510).\n- Input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bsc#1051510).\n- Input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bsc#1051510).\n- Input: leds - fix out of bound access (bsc#1051510).\n- Input: synaptics - Lenovo Carbon X1 Gen5 (2017) devices should use RMI (bsc#1051510).\n- Input: synaptics - Lenovo Thinkpad X1 Carbon G5 (2017) with Elantech trackpoints should use RMI (bsc#1051510).\n- Input: synaptics - add Intertouch support on X1 Carbon 6th and X280 (bsc#1051510).\n- Input: synaptics - add Lenovo 80 series ids to SMBus (bsc#1051510).\n- Input: synaptics - reset the ABS_X/Y fuzz after initializing MT axes (bsc#1051510).\n- Input: synaptics-rmi4 - fix an unchecked out of memory error path (bsc#1051510).\n- Input: synaptics: Add intertouch blacklist for Thinkpad Helix (bsc#1090457).\n- Input: xpad - add GPD Win 2 Controller USB IDs (bsc#1051510).\n- Input: xpad - fix GPD Win 2 controller name (bsc#1051510).\n- Input: xpad - sync supported devices with 360Controller (bsc#1051510).\n- Input: xpad - sync supported devices with XBCD (bsc#1051510).\n- KABI protect struct nd_region ().\n- KABI: hide ftrace_enabled in paca (bsc#1088804).\n- KEYS: DNS: limit the length of option strings (networking-stable-18_04_26).\n- KEYS: Use individual pages in big_key for crypto buffers (bsc#1051510).\n- KVM: MMU: consider host cache mode in MMIO page check (bsc#1087213).\n- KVM: PPC: Book3S HV: Fix ppc_breakpoint_available compile error (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle migration with POWER9 disabled DAWR (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_dabr() on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_mode(SET_DAWR) on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: trace_tlbie must not be called in realmode (bsc#1061840).\n- MD: Free bioset when md_run fails (bsc#1093023).\n- Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bsc#1090888).\n- NFC: fix device-allocation error return (bsc#1051510).\n- NFC: llcp: Limit size of SDP URI (bsc#1051510).\n- NFC: pn533: do not send USB data off of the stack (bsc#1051510).\n- NFS: Revert \u0027NFS: Move the flock open mode check into nfs_flock()\u0027 (bsc#1098983).\n- NFSv4: Revert commit 5f83d86cf531d (\u0027NFSv4.x: Fix wraparound issues..\u0027) (git-fixes).\n- PCI/ASPM: Add L1 Substates definitions (bsc#1051510).\n- PCI/ASPM: Calculate LTR_L1.2_THRESHOLD from device characteristics (bsc#1051510).\n- PCI/DPC: Do not enable DPC if AER control is not allowed by the BIOS (bsc#1093184).\n- PCI/PME: Handle invalid data when reading Root Status (bsc#1051510).\n- PCI: Add ACS quirk for Intel 300 series (bsc#1051510).\n- PCI: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bsc#1051510).\n- PCI: Create SR-IOV virtfn/physfn links before attaching driver (bsc#1051510).\n- PCI: Detach driver before procfs and sysfs teardown on device remove (bsc#1051510).\n- PCI: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510).\n- PCI: Remove messages about reassigning resources (bsc#1051510).\n- PCI: Restore config space on runtime resume despite being unbound (bsc#1051510).\n- PCI: aardvark: Fix PCIe Max Read Request Size setting (bsc#1051510).\n- PCI: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510).\n- PCI: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510).\n- PCI: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510).\n- PCI: designware-ep: Fix find_first_zero_bit() usage (bsc#1051510).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094541).\n- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510).\n- PCI: shpchp: Enable bridge bus mastering if MSI is enabled (bsc#1051510).\n- PM / OPP: Add missing of_node_put(np) (bsc#1051510).\n- PM / OPP: Call notifier without holding opp_table-\u003elock (bsc#1051510).\n- PM / OPP: Move error message to debug level (bsc#1051510).\n- PM / devfreq: Fix potential NULL pointer dereference in governor_store (bsc#1051510).\n- PM / s2idle: Clear the events_check_enabled flag (bsc#1051510).\n- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1051510).\n- PM: docs: Drop an excess character from devices.rst (bsc#1051510).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- Preliminary series sort\n- RDMA/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283).\n- RDMA/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283).\n- RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (bsc#1046306).\n- RDMA/core: Reduce poll batch for direct cq polling (bsc#1046306).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#1084001).\n- RDMA/mlx4: Fix uABI structure layouts for 32/64 compat (bsc#1071218).\n- RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory (bsc#1046305).\n- RDMA/mlx5: Protect from NULL pointer derefence (bsc#1046305).\n- RDMA/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bsc#1058513).\n- RDMA/rxe: Fix an out-of-bounds read (bsc#1050662).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bsc#1046306).\n- RDMA/ucma: Introduce safer rdma_addr_size() variants (bsc#1046306).\n- RDMAVT: Fix synchronization around percpu_ref (bsc#1058717).\n- RDS: Check cmsg_len before dereferencing CMSG_DATA (networking-stable-17_12_31).\n- README.BRANCH: add Takashi as co-maintainer\n- Re-sort some patches to match SLE15\n- Refresh patches.suse/btrfs-use-kvzalloc-to-allocate-btrfs_fs_info.patch - Fixed References (bsc#1062897). \n- Remove the old fallback for iTCO/WDAT conflict (bsc#1073960) Now the upstream fix is included, so let\u0027s rip off the old trickery.\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bsc#1051510).\n- Revert \u0027Remove patces for bug 1087405 due to regression\u0027 This reverts commit f91a2ea5192d9e933c41600da5d1543155df381c.\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bsc#1051510).\n- Revert \u0027drm/i915/edp: Allow alternate fixed mode for eDP if available.\u0027 (bsc#1093604).\n- Revert \u0027kernel-binary: do not package extract-cert when not signing modules\u0027 This reverts commit 10a8bc496a553b8069d490a8ae7508bdb19f58d9.\n- Revert \u0027rt2800: use TXOP_BACKOFF for probe frames\u0027 (bsc#1051510).\n- Revert \u0027scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()\u0027 (bsc#1099918).\n- Sort series.conf\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: serial: pl2303: new device id for Chilitag (bsc#1087092).\n- USB: serial: simple: add Motorola Tetra driver (bsc#1087092).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bsc#1090888).\n- Update patches.fixes/vti-fix-use-after-free-in-vti_tunnel_xmit-vti6_tnl_x.patch (bsc#1076830 networking-stable-17_10_09).\n- Update patches.suse/ceph-quota-add-counter-for-snaprealms-with-quota.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-add-initial-infrastructure-to-support-cephfs-quotas.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-cache-inode-pointer-in-ceph_snap_realm.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-don-t-allow-cross-quota-renames.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_bytes.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_files.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-update-mds-when-max_bytes-is-approaching.patch (bsc#1089115).\n- Update for above change patches.drivers/0003-md-cluster-Suspend-writes-in-RAID10-if-within-range.patch (bsc#1093023).\n- Update patches.suse/ceph-don-t-check-quota-for-snap-inode.patch (bsc#1089115).\n- Update patches.suse/ceph-fix-root-quota-realm-check.patch (bsc#1089115).\n- X.509: fix BUG_ON() when hash algorithm is unsupported (bsc#1051510).\n- X.509: fix NULL dereference when restricting key with unsupported_sig (bsc#1051510).\n- X.509: fix comparisons of -\u003epkey_algo (bsc#1051510).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bsc#1051510).\n- acpi, nfit: quiet invalid block-aperture-region warnings (bsc#1091781).\n- acpi, nfit: rework NVDIMM leaf method detection (bsc#1091782).\n- acpi: Add helper for deactivating memory region (bsc#1100132).\n- acpi: nfit: Add support for detect platform CPU cache flush on power loss (bsc#1091424).\n- acpi: nfit: add persistent memory control flag for nd_region (bsc#1091424).\n- adding missing rcu_read_unlock in ipxip6_rcv (networking-stable-17_12_31).\n- af_netlink: ensure that NLMSG_DONE never fails in dumps (networking-stable-17_11_20).\n- afs: Connect up the CB.ProbeUuid (bsc#1052766).\n- afs: Fix missing error handling in afs_write_end() (bsc#1052766).\n- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26).\n- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26).\n- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26).\n- amd-xgbe: Restore PCI interrupt enablement setting on resume (networking-stable-18_03_07).\n- apparmor: fix dangling symlinks to policy rawdata after replacement (bsc#1095893).\n- apparmor: fix display of .ns_name for containers (bsc#1095893).\n- apparmor: fix logging of the existence test for signals (bsc#1095893).\n- apparmor: fix memory leak on buffer on error exit path (bsc#1095893).\n- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bsc#1051510).\n- ath10k: correct target assert problem due to CE5 stuck (bsc#1051510).\n- ath10k: search all IEs for variant before falling back (bsc#1051510).\n- ath9k: fix crash in spectral scan (bsc#1051510).\n- auxdisplay: fix broken menu (bsc#1051510).\n- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510).\n- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: tdo24m: Fix the SPI CS between transfers (bsc#1051510).\n- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1093023).\n- bcache: Annotate switch fall-through (bsc#1093023).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1093023).\n- bcache: Fix indentation (bsc#1093023).\n- bcache: Fix kernel-doc warnings (bsc#1093023).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1093023).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1093023).\n- bcache: Remove an unused variable (bsc#1093023).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1093023).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1093023).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1093023).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1093023).\n- bcache: add io_disable to struct cached_dev (bsc#1093023).\n- bcache: add journal statistic (bsc#1093023).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1093023).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1093023).\n- bcache: allow quick writeback when backing idle (bsc#1093023).\n- bcache: closures: move control bits one bit right (bsc#1093023).\n- bcache: comment on direct access to bvec table (bsc#1093023).\n- bcache: correct flash only vols (check all uuids) (bsc#1093023).\n- bcache: count backing device I/O error for writeback I/O (bsc#1093023).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1093023).\n- bcache: fix error return value in memory shrink (bsc#1093023).\n- bcache: fix for allocator and register thread race (bsc#1093023).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1093023).\n- bcache: fix high CPU occupancy during journal (bsc#1093023).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1093023).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1093023).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1093023).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1093023).\n- bcache: fix unmatched generic_end_io_acct() and generic_start_io_acct() (bsc#1093023).\n- bcache: fix using of loop variable in memory shrink (bsc#1093023).\n- bcache: fix writeback target calc on large devices (bsc#1093023).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1093023).\n- bcache: mark closure_sync() __sched (bsc#1093023).\n- bcache: move closure debug file into debug directory (bsc#1093023).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1093023).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1093023).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1093023).\n- bcache: ret IOERR when read meets metadata error (bsc#1093023).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1093023).\n- bcache: return attach error when no cache set exist (bsc#1093023).\n- bcache: segregate flash only volume write streams (bsc#1093023).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1093023).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1093023).\n- bcache: set error_limit correctly (bsc#1093023).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1093023).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1093023).\n- bcache: stop writeback thread after detaching (bsc#1093023).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1093023).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1093023).\n- bcache: writeback: properly order backing device IO (bsc#1093023).\n- bdi: Fix oops in wb_workfn() (bsc#1052766).\n- bdi: wake up concurrent wb_shutdown() callers (bsc#1052766).\n- be2net: Fix HW stall issue in Lancer (bsc#1086288).\n- be2net: Fix error detection logic for BE3 (bsc#1050252).\n- be2net: Handle transmit completion errors in Lancer (bsc#1086288).\n- bfq-iosched: ensure to clear bic/bfqq pointers when preparing request (bsc#1052766).\n- bfq: Re-enable auto-loading when built as a module (bsc#1099918).\n- bio-integrity: move the bio integrity profile check earlier in bio_integrity_prep (bsc#1093023).\n- bitmap: fix memset optimization on big-endian systems (bsc#1051510).\n- bitops: Introduce assign_bit() (bsc#1093023).\n- blacklist.conf: blacklist further commits not needed (bsc#1085933, bsc#1085938, bsc#1085939)\n- blacklist.conf: blacklist tools specific change bsc#1085941\n- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918).\n- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918).\n- blk-mq: make sure hctx-\u003enext_cpu is set correctly (bsc#1099918).\n- blk-mq: make sure that correct hctx-\u003enext_cpu is set (bsc#1099918).\n- blk-mq: reinit q-\u003etag_set_list entry only after grace period (bsc#1099918).\n- blk-mq: simplify queue mapping and schedule with each possisble CPU (bsc#1099918).\n- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918).\n- block, bfq: fix occurrences of request finish method\u0027s old name (bsc#1099918).\n- block, bfq: put async queues for root bfq groups too (bsc#1052766).\n- block/loop: fix deadlock after loop_set_status (bsc#1052766).\n- block/swim: Remove extra put_disk() call from error path (bsc#1099918).\n- block: Add comment to submit_bio_wait() (bsc#1093023).\n- block: Fix __bio_integrity_endio() documentation (bsc#1099918).\n- block: Fix cloning of requests with a special payload (bsc#1099918).\n- block: Set BIO_TRACE_COMPLETION on new bio during split (bsc#1052766).\n- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918).\n- block: factor out __blkdev_issue_zero_pages() (bsc#1099918).\n- block: sed-opal: Fix a couple off by one bugs (bsc#1099918).\n- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323).\n- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323).\n- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323).\n- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323).\n- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323).\n- bnx2x: fix slowpath null crash (bsc#1086323).\n- bnx2x: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086323).\n- bnx2x: use the right constant (bsc#1086323).\n- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282).\n- bnxt_en: Add IRQ remapping logic (bsc#1086282).\n- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282).\n- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282).\n- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282).\n- bnxt_en: Add extended port statistics support (bsc#1086282).\n- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282).\n- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282).\n- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282).\n- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Change IRQ assignment for RDMA driver (bsc#1086282).\n- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282).\n- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282).\n- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282).\n- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282).\n- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282).\n- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282).\n- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282).\n- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282).\n- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282).\n- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282).\n- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282).\n- bnxt_en: Fix firmware message delay loop regression (bsc#1086282).\n- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282).\n- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282).\n- bnxt_en: Forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Ignore src port field in decap filter nodes (bsc#1050242).\n- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282).\n- bnxt_en: Implement new method to reserve rings (bsc#1086282).\n- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282).\n- bnxt_en: Improve ring allocation logic (bsc#1086282).\n- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282).\n- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282).\n- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282).\n- bnxt_en: Need to include RDMA rings in bnxt_check_rings() (bsc#1086282).\n- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282).\n- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282).\n- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282).\n- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282).\n- bnxt_en: Refactor hardware resource data structures (bsc#1086282).\n- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282).\n- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282).\n- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282).\n- bnxt_en: Reserve completion rings and MSIX for bnxt_re RDMA driver (bsc#1086282).\n- bnxt_en: Reserve resources for RFS (bsc#1086282).\n- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282).\n- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282).\n- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282).\n- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282).\n- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282).\n- bnxt_en: Support max-mtu with VF-reps (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282).\n- bnxt_en: Use a dedicated VNIC mode for RDMA (bsc#1086282).\n- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282).\n- bnxt_en: do not allow wildcard matches for L2 flows (bsc#1050242).\n- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282).\n- bnxt_en: fix clear flags in ethtool reset handling (bsc#1050242).\n- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282).\n- bonding: discard lowest hash bit for 802.3ad layer3+4 (networking-stable-17_11_20).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26).\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10).\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10).\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10).\n- bonding: send learning packets for vlans on slave (networking-stable-18_05_15).\n- bpf, ppc64: fix out of bounds access in tail call (bsc#1083647).\n- bpf, x64: fix memleak when not converging after image (bsc#1083647).\n- bpf: add schedule points in percpu arrays management (bsc#1083647).\n- bpf: fix bpf_skb_adjust_net/bpf_skb_proto_xlat to deal with gso sctp skbs (bsc#1076830).\n- bpf: fix mlock precharge on arraymaps (bsc#1083647).\n- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- brcmfmac: Fix check for ISO3166 code (bsc#1051510).\n- brd: fix overflow in __brd_direct_access (bsc#1052766).\n- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15).\n- Btrfs: Take trans lock before access running trans in check_delayed_ref (bsc#1097105).\n- Btrfs: return error value if create_io_em failed in cow_file_range (bsc#1097105).\n- can: af_can: can_pernet_init(): add missing error handling for kzalloc returning NULL (bsc#1051510).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: c_can: do not indicate triple sampling support for D_CAN (bsc#1051510).\n- can: cc770: Fix queue stall and dropped RTR reply (bsc#1051510).\n- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bsc#1051510).\n- can: cc770: Fix use after free in cc770_tx_interrupt() (bsc#1051510).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: esd_usb2: Fix can_dlc value for received RTR, frames (bsc#1051510).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bsc#1051510).\n- can: flexcan: fix VF610 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX28 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX6 state transition issue (bsc#1051510).\n- can: flexcan: fix p1010 state transition issue (bsc#1051510).\n- can: flexcan: fix state transition regression (bsc#1051510).\n- can: flexcan: implement error passive state quirk (bsc#1051510).\n- can: flexcan: rename legacy error state quirk (bsc#1051510).\n- can: gs_usb: fix busy loop if no more TX context is available (bsc#1051510).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bsc#1051510).\n- can: hi311x: Acquire SPI lock on -\u003edo_get_berr_counter (bsc#1051510).\n- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510).\n- can: ifi: Check core revision upon probe (bsc#1051510).\n- can: ifi: Fix transmitter delay calculation (bsc#1051510).\n- can: ifi: Repair the error handling (bsc#1051510).\n- can: kvaser_usb: Correct return value in printout (bsc#1051510).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bsc#1051510).\n- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bsc#1051510).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bsc#1051510).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: kvaser_usb: free buf in error paths (bsc#1051510).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bsc#1051510).\n- can: mcba_usb: cancel urb on -EPROTO (bsc#1051510).\n- can: mcba_usb: fix device disconnect bug (bsc#1051510).\n- can: peak/pci: fix potential bug when probe() fails (bsc#1051510).\n- can: peak/pcie_fd: fix echo_skb is occupied! bug (bsc#1051510).\n- can: peak/pcie_fd: fix potential bug in restarting tx queue (bsc#1051510).\n- can: peak/pcie_fd: remove useless code when interface starts (bsc#1051510).\n- can: peak: Add support for new PCIe/M2 CAN FD interfaces (bsc#1051510).\n- can: peak: fix potential bug in packet fragmentation (bsc#1051510).\n- can: sun4i: fix loopback mode (bsc#1051510).\n- can: sun4i: handle overrun in RX FIFO (bsc#1051510).\n- can: ti_hecc: Fix napi poll return value for repoll (bsc#1051510).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: vxcan: improve handling of missing peer name attribute (bsc#1051510).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bsc#1051510).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: change variable name to follow common rule (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: do not wait on writeback when there is no more dirty pages (bsc#1089115).\n- ceph: filter out used flags when printing unused open flags (bsc#1089115).\n- ceph: fix alignment of rasize (bsc#1098236).\n- ceph: fix dentry leak in splice_dentry() (bsc#1098236).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).\n- ceph: fix wrong check for the case of updating link count (bsc#1098236).\n- ceph: keep consistent semantic in fscache related option combination (bsc#1089115).\n- ceph: mark the cap cache as unreclaimable (bsc#1089115).\n- ceph: optimize mds session register (bsc#1089115).\n- ceph: optimize memory usage (bsc#1089115).\n- ceph: optimizing cap allocation (bsc#1089115).\n- ceph: optimizing cap reservation (bsc#1089115).\n- ceph: prevent i_version from going back (bsc#1098236).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: release unreserved caps if having enough available caps (bsc#1089115).\n- ceph: return proper bool type to caller instead of pointer (bsc#1089115).\n- ceph: support file lock on directory (bsc#1098236).\n- ceph: use seq_show_option for string type options (bsc#1089115).\n- cfg80211: clear wep keys after disconnection (bsc#1051510).\n- cfg80211: further limit wiphy names to 64 bytes (bsc#1051510).\n- cfg80211: limit wiphy names to 128 bytes (bsc#1051510).\n- cgroup: Fix deadlock in cpu hotplug path (Git-fixes).\n- cgroup: Reinit cgroup_taskset structure before cgroup_migrate_execute() returns (Git-fixes).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- coresight: Fix disabling of CoreSight TPIU (bsc#1051510).\n- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110).\n- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510).\n- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110).\n- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110).\n- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110).\n- cpufreq: schedutil: Avoid using invalid next_freq (git-fixes).\n- cpuidle: fix broadcast control when broadcast can not be entered (Git-fixes).\n- cros_ec: fix nul-termination for firmware build info (bsc#1051510).\n- crypto: AF_ALG - remove SGL terminator indicator when chaining (bsc#1051510).\n- crypto: aes-generic - build with -Os on gcc-7+ (bsc#1051510).\n- crypto: aes-generic - fix aes-generic regression on powerpc (bsc#1051510).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bsc#1051510).\n- crypto: ahash - Fix early termination in hash walk (bsc#1051510).\n- crypto: arm,arm64 - Fix random regeneration of S_shipped (bsc#1051510).\n- crypto: atmel-aes - fix the keys zeroing on errors (bsc#1051510).\n- crypto: caam - Fix null dereference at error path (bsc#1051510).\n- crypto: caam - fix DMA mapping dir for generated IV (bsc#1051510).\n- crypto: caam - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam - fix incorrect define (bsc#1051510).\n- crypto: caam - strip input zeros from RSA input buffer (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: ccp - Fix sparse, use plain integer as NULL pointer (git-fixes 200664d5237f).\n- crypto: drbg - set freed buffers to NULL (bsc#1051510).\n- crypto: lrw - Free rctx-\u003eext with kzfree (bsc#1051510).\n- crypto: omap-sham - fix memleak (bsc#1051510).\n- crypto: qat - remove unused and redundant pointer vf_info (bsc#1051510).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES XTS init (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bsc#1051510).\n- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bsc#1051510).\n- cxgb4: Correct ntuple mask validation for hash filters (bsc#1064802 bsc#1066129).\n- cxgb4: fix error return code in adap_init0() (bsc#1064802 bsc#1066129).\n- cxgb4: fix offset in collecting TX rate limit info (bsc#1073513).\n- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bsc#1046542).\n- dax, dm: allow device-mapper to operate without dax support (bsc#1093023).\n- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28).\n- dccp: fix tasklet usage (networking-stable-18_05_15).\n- delayacct: Account blkio completion on the correct task (bsc#1052766).\n- dell_rbu: make firmware payload memory uncachable (bsc#1087978).\n- device-dax: allow MAP_SYNC to succeed (bsc#1052766).\n- devlink: Remove redundant free on error path (networking-stable-18_03_28).\n- direct-io: Prevent NULL pointer access in submit_page_section (bsc#1052766).\n- disable patches.drivers/s390-qeth-use-Read-device-to-query-hypervisor-for-MA.patch Backport of mainline commit b7493e91c11a (\u0027s390/qeth: use Read device to query hypervisor for MAC\u0027) changes assigned MAC address (and breaks networking) on one of our machines and it\u0027s not clear which address is actually correct (bsc#1094575).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm btree: fix serious bug in btree_split_beneath() (bsc#1093023).\n- dm bufio: add missed destroys of client mutex (bsc#1093023).\n- dm bufio: check result of register_shrinker() (bsc#1093023).\n- dm bufio: delete outdated comment (bsc#1093023).\n- dm bufio: do not embed a bio in the dm_buffer structure (bsc#1093023).\n- dm bufio: eliminate unnecessary labels in dm_bufio_client_create() (bsc#1093023).\n- dm bufio: fix buffer alignment (bsc#1093023).\n- dm bufio: fix integer overflow when limiting maximum cache size (bsc#1093023).\n- dm bufio: fix shrinker scans when (nr_to_scan lower than retain_target) (bsc#1093023).\n- dm bufio: get rid of slab cache name allocations (bsc#1093023).\n- dm bufio: move dm-bufio.h to include/linux/ (bsc#1093023).\n- dm bufio: relax alignment constraint on slab cache (bsc#1093023).\n- dm bufio: remove code that merges slab caches (bsc#1093023).\n- dm bufio: reorder fields in dm_buffer structure (bsc#1093023).\n- dm bufio: support non-power-of-two block sizes (bsc#1093023).\n- dm bufio: use REQ_OP_READ and REQ_OP_WRITE (bsc#1093023).\n- dm bufio: use slab cache for dm_buffer structure allocations (bsc#1093023).\n- dm cache background tracker: limit amount of background work that may be issued at once (bsc#1093023).\n- dm cache policy smq: allocate cache blocks in order (bsc#1093023).\n- dm cache policy smq: change max background work from 10240 to 4096 blocks (bsc#1093023).\n- dm cache policy smq: handle races with queuing background_work (bsc#1093023).\n- dm cache policy smq: take origin idle status into account when queuing writebacks (bsc#1093023).\n- dm cache: convert dm_cache_metadata.ref_count from atomic_t to refcount_t (bsc#1093023).\n- dm cache: fix race condition in the writeback mode overwrite_bio optimisation (bsc#1093023).\n- dm cache: lift common migration preparation code to alloc_migration() (bsc#1093023).\n- dm cache: pass cache structure to mode functions (bsc#1093023).\n- dm cache: remove all obsolete writethrough-specific code (bsc#1093023).\n- dm cache: remove usused deferred_cells member from struct cache (bsc#1093023).\n- dm cache: simplify get_per_bio_data() by removing data_size argument (bsc#1093023).\n- dm cache: submit writethrough writes in parallel to origin and cache (bsc#1093023).\n- dm crypt: allow unaligned bv_offset (bsc#1093023).\n- dm crypt: fix crash by adding missing check for auth key size (bsc#1093023).\n- dm crypt: fix error return code in crypt_ctr() (bsc#1093023).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (bsc#1093023).\n- dm crypt: limit the number of allocated pages (bsc#1093023).\n- dm crypt: reject sector_size feature if device length is not aligned to it (bsc#1093023).\n- dm crypt: remove BIOSET_NEED_RESCUER flag (bsc#1093023).\n- dm crypt: wipe kernel key copy after IV initialization (bsc#1093023).\n- dm flakey: check for null arg_name in parse_features() (bsc#1093023).\n- dm integrity: allow unaligned bv_offset (bsc#1093023).\n- dm integrity: count and display checksum failures (bsc#1093023).\n- dm integrity: do not check integrity for failed read operations (bsc#1093023).\n- dm integrity: do not store cipher request on the stack (bsc#1093023).\n- dm integrity: fail early if required HMAC key is not available (bsc#1093023).\n- dm integrity: make blk_integrity_profile structure const (bsc#1093023).\n- dm integrity: optimize writing dm-bufio buffers that are partially changed (bsc#1093023).\n- dm integrity: use init_completion instead of COMPLETION_INITIALIZER_ONSTACK (bsc#1093023).\n- dm integrity: use kvfree for kvmalloc\u0027d memory (bsc#1099918).\n- dm io: remove BIOSET_NEED_RESCUER flag from bios bioset (bsc#1093023).\n- dm ioctl: constify ioctl lookup table (bsc#1093023).\n- dm log writes: add support for DAX (bsc#1093023).\n- dm log writes: add support for inline data buffers (bsc#1093023).\n- dm log writes: do not use all the cpu while waiting to log blocks (bsc#1093023).\n- dm log writes: fix \u003e512b sectorsize support (bsc#1093023).\n- dm log writes: fix max length used for kstrndup (bsc#1093023).\n- dm log writes: record metadata flag for better flags record (bsc#1093023).\n- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918).\n- dm raid: add component device size checks to avoid runtime failure (bsc#1093023).\n- dm raid: avoid passing array_in_sync variable to raid_status() callees (bsc#1093023).\n- dm raid: bump target version to reflect numerous fixes (bsc#1093023).\n- dm raid: consume sizes after md_finish_reshape() completes changing them (bsc#1093023).\n- dm raid: correct resizing state relative to reshape space in ctr (bsc#1093023).\n- dm raid: display a consistent copy of the MD status via raid_status() (bsc#1093023).\n- dm raid: do not use \u0027const\u0027 in function return (bsc#1099918).\n- dm raid: ensure \u0027a\u0027 chars during reshape (bsc#1093023).\n- dm raid: fix deadlock caused by premature md_stop_writes() (bsc#1093023).\n- dm raid: fix incorrect status output at the end of a \u0027recover\u0027 process (bsc#1093023).\n- dm raid: fix incorrect sync_ratio when degraded (bsc#1093023).\n- dm raid: fix nosync status (bsc#1093023).\n- dm raid: fix panic when attempting to force a raid to sync (bsc#1093023).\n- dm raid: fix parse_raid_params() variable range issue (bsc#1093023).\n- dm raid: fix raid set size revalidation (bsc#1093023).\n- dm raid: fix raid_resume() to keep raid set frozen as needed (bsc#1093023).\n- dm raid: fix rs_get_progress() synchronization state/ratio (bsc#1093023).\n- dm raid: make raid_sets symbol static (bsc#1093023).\n- dm raid: simplify rs_get_progress() (bsc#1093023).\n- dm raid: small cleanup and remove unsed \u0027struct raid_set\u0027 member (bsc#1093023).\n- dm raid: stop keeping raid set frozen altogether (bsc#1093023).\n- dm raid: use rs_is_raid*() (bsc#1093023).\n- dm raid: validate current raid sets redundancy (bsc#1093023).\n- dm rq: do not update rq partially in each ending bio (bsc#1093023).\n- dm rq: make dm-sq requeuing behavior consistent with dm-mq behavior (bsc#1093023).\n- dm space map metadata: use ARRAY_SIZE (bsc#1093023).\n- dm stripe: get rid of a Variable Length Array (VLA) (bsc#1093023).\n- dm table: fix regression from improper dm_dev_internal.count refcount_t conversion (bsc#1093023).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bsc#1093023).\n- dm thin: fix trailing semicolon in __remap_and_issue_shared_cell (bsc#1093023).\n- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918).\n- dm zoned: ignore last smaller runt zone (bsc#1093023).\n- dm-crypt: do not clear bvec-\u003ebv_page in crypt_free_buffer_pages() (bsc#1093023).\n- dm-crypt: do not mess with BIP_BLOCK_INTEGRITY (bsc#1093023).\n- dm-raid: fix a race condition in request handling (bsc#1093023).\n- dm: backfill missing calls to mutex_destroy() (bsc#1093023).\n- dm: clear all discard attributes in queue_limits when discards are disabled (bsc#1093023).\n- dm: convert DM printk macros to pr level macros (bsc#1099918).\n- dm: convert dm_dev_internal.count from atomic_t to refcount_t (bsc#1093023).\n- dm: convert table_device.count from atomic_t to refcount_t (bsc#1093023).\n- dm: correctly handle chained bios in dec_pending() (bsc#1093023).\n- dm: discard support requires all targets in a table support discards (bsc#1093023).\n- dm: do not set \u0027discards_supported\u0027 in targets that do not need it (bsc#1093023).\n- dm: ensure bio submission follows a depth-first tree walk (bsc#1093023).\n- dm: ensure bio-based DM\u0027s bioset and io_pool support targets\u0027 maximum IOs (bsc#1093023).\n- dm: fix __send_changing_extent_only() to send first bio and chain remainder (bsc#1093023).\n- dm: fix comment above dm_accept_partial_bio (bsc#1093023).\n- dm: fix printk() rate limiting code (bsc#1099918).\n- dm: fix various targets to dm_register_target after module __init resources created (bsc#1093023).\n- dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE (bsc#1093023).\n- dm: move dm_table_destroy() to same header as dm_table_create() (bsc#1093023).\n- dm: remove BIOSET_NEED_RESCUER based dm_offload infrastructure (bsc#1093023).\n- dm: remove stale comment blocks (bsc#1093023).\n- dm: remove unused \u0027num_write_bios\u0027 target interface (bsc#1093023).\n- dm: remove unused macro DM_MOD_NAME_SIZE (bsc#1093023).\n- dm: rename \u0027bio\u0027 member of dm_io structure to \u0027orig_bio\u0027 (bsc#1093023).\n- dm: safely allocate multiple bioset bios (bsc#1093023).\n- dm: set QUEUE_FLAG_DAX accordingly in dm_table_set_restrictions() (bsc#1093023).\n- dm: simplify start of block stats accounting for bio-based (bsc#1093023).\n- dm: small cleanup in dm_get_md() (bsc#1093023).\n- dm: use bio_split() when splitting out the already processed bio (bsc#1099918).\n- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bsc#1051510).\n- dmaengine: at_xdmac: fix rare residue corruption (bsc#1051510).\n- dmaengine: dmatest: fix container_of member in dmatest_callback (bsc#1051510).\n- dmaengine: dmatest: move callback wait queue to thread context (bsc#1051510).\n- dmaengine: dmatest: warn user when dma test times out (bsc#1051510).\n- dmaengine: edma: Align the memcpy acnt array size with the transfer (bsc#1051510).\n- dmaengine: ioat: Fix error handling path (bsc#1051510).\n- dmaengine: jz4740: disable/unprepare clk if probe fails (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix possible race condition with dma_inuse (bsc#1051510).\n- docs: disable KASLR when debugging kernel (bsc#1051510).\n- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28).\n- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918).\n- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510).\n- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918).\n- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323).\n- drm/amd/powerplay: Fix enum mismatch (bsc#1051510).\n- drm/amdgpu/sdma: fix mask in emit_pipeline_sync (bsc#1051510).\n- drm/amdgpu/si: implement get/set pcie_lanes asic callback (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510).\n- drm/amdgpu: Add an ATPX quirk for hybrid laptop (bsc#1051510).\n- drm/amdgpu: Fix PCIe lane width calculation (bsc#1051510).\n- drm/amdgpu: Fix always_valid bos multiple LRU insertions (bsc#1051510).\n- drm/amdgpu: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510).\n- drm/amdgpu: adjust timeout for ib_ring_tests(v2) (bsc#1051510).\n- drm/amdgpu: disable GFX ring and disable PQ wptr in hw_fini (bsc#1051510).\n- drm/amdgpu: set COMPUTE_PGM_RSRC1 for SGPR/VGPR clearing shaders (bsc#1051510).\n- drm/amdkfd: fix clock counter retrieval for node without GPU (bsc#1051510).\n- drm/armada: fix leak of crtc structure (bsc#1051510).\n- drm/ast: Fixed 1280x800 Display Issue (bsc#1051510).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510).\n- drm/atomic: Clean old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/atomic: Clean private obj old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/bridge: analogix dp: Fix runtime PM state in get_modes() callback (bsc#1051510).\n- drm/bridge: tc358767: do no fail on hi-res displays (bsc#1051510).\n- drm/bridge: tc358767: filter out too high modes (bsc#1051510).\n- drm/bridge: tc358767: fix 1-lane behavior (bsc#1051510).\n- drm/bridge: tc358767: fix AUXDATAn registers access (bsc#1051510).\n- drm/bridge: tc358767: fix DP0_MISC register set (bsc#1051510).\n- drm/bridge: tc358767: fix timing calculations (bsc#1051510).\n- drm/bridge: vga-dac: Fix edid memory leak (bsc#1051510).\n- drm/dumb-buffers: Integer overflow in drm_mode_create_ioctl() (bsc#1051510).\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1051510).\n- drm/exynos: Allow DRM_EXYNOS on s5pv210 (bsc#1051510).\n- drm/exynos: Fix default value for zpos plane property (bsc#1051510).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bsc#1051510).\n- drm/exynos: g2d: use monotonic timestamps (bsc#1051510).\n- drm/fsl-dcu: enable IRQ before drm_atomic_helper_resume() (bsc#1051510).\n- drm/hisilicon: Ensure LDI regs are properly configured (bsc#1051510).\n- drm/i915/audio: Fix audio detection issue on GLK (bsc#1051510).\n- drm/i915/audio: set minimum CD clock to twice the BCLK (bsc#1095265).\n- drm/i915/bios: filter out invalid DDC pins from VBT child devices (bsc#1051510).\n- drm/i915/execlists: Use rmb() to order CSB reads (bsc#1051510).\n- drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk (bsc#1051510).\n- drm/i915/glk: Add MODULE_FIRMWARE for Geminilake (bsc#1095265).\n- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510).\n- drm/i915/gvt: throw error on unhandled vfio ioctls (bsc#1051510).\n- drm/i915/lvds: Move acpi lid notification registration to registration phase (bsc#1051510).\n- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510).\n- drm/i915/userptr: reject zero user_size (bsc#1051510).\n- drm/i915: Adjust eDP\u0027s logical vco in a reliable place (bsc#1095265).\n- drm/i915: Apply batch location restrictions before pinning (bsc#1051510).\n- drm/i915: Call i915_perf_fini() on init_hw error unwind (bsc#1051510).\n- drm/i915: Disable LVDS on Radiant P845 (bsc#1051510).\n- drm/i915: Do no use kfree() to free a kmem_cache_alloc() return value (bsc#1051510).\n- drm/i915: Do not request a bug report for unsafe module parameters (bsc#1051510).\n- drm/i915: Enable display WA#1183 from its correct spot (bsc#1051510).\n- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510).\n- drm/i915: Fix LSPCON TMDS output buffer enabling from low-power state (bsc#1051510).\n- drm/i915: Fix context ban and hang accounting for client (bsc#1051510).\n- drm/i915: Fix drm:intel_enable_lvds ERROR message in kernel log (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove unbannable context spam from reset (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510).\n- drm/imx: move arming of the vblank event to atomic_flush (bsc#1051510).\n- drm/meson: Fix an un-handled error path in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: Fix some error handling paths in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: fix vsync buffer update (bsc#1051510).\n- drm/msm/dsi: use correct enum in dsi_get_cmd_fmt (bsc#1051510).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1051510).\n- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209).\n- drm/msm: fix leak in failed get_pages (bsc#1051510).\n- drm/nouveau/bar/gf100: add config option to limit BAR2 to 16MiB (bsc#1095094).\n- drm/nouveau/bios/iccsense: rails for power sensors have a mask of 0xf8 for version 0x10 (bsc#1095094).\n- drm/nouveau/bios/init: add a new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/bios/init: add or/link args separate from output path (bsc#1095094).\n- drm/nouveau/bios/init: bump script offset to 32-bits (bsc#1095094).\n- drm/nouveau/bios/init: remove internal use of nvbios_init.bios (bsc#1095094).\n- drm/nouveau/bios/init: rename \u0027crtc\u0027 to \u0027head\u0027 (bsc#1095094).\n- drm/nouveau/bios/init: rename nvbios_init() to nvbios_devinit() (bsc#1095094).\n- drm/nouveau/bios/volt: Parse min and max for Version 0x40 (bsc#1095094).\n- drm/nouveau/bios: Demote missing fp table message to NV_DEBUG (bsc#1095094).\n- drm/nouveau/bl: fix backlight regression (bsc#1095094).\n- drm/nouveau/devinit: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/dp: determine a failsafe link training rate (bsc#1095094).\n- drm/nouveau/disp/dp: determine link bandwidth requirements from head state (bsc#1095094).\n- drm/nouveau/disp/dp: no need for lt_state except during manual link training (bsc#1095094).\n- drm/nouveau/disp/dp: only check for re-train when the link is active (bsc#1095094).\n- drm/nouveau/disp/dp: remove DP_PWR method (bsc#1095094).\n- drm/nouveau/disp/dp: store current link configuration in nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/dp: train link only when actively displaying an image (bsc#1095094).\n- drm/nouveau/disp/dp: use cached link configuration when checking link status (bsc#1095094).\n- drm/nouveau/disp/dp: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/g84-: Extend NVKM HDMI power control method to set InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g84-: port OR HDMI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g84-gt200: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP drive setting control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP lane mapping to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link power control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link setup to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP training pattern control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119-: avoid creating non-existent heads (bsc#1095094).\n- drm/nouveau/disp/gf119-: port OR DP VCPI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gf119: add missing drive vfunc ptr (bsc#1095094).\n- drm/nouveau/disp/gk104-: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gm200-: allow non-identity mapping of SOR != macro links (bsc#1095094).\n- drm/nouveau/disp/gt215-: port HDA ELD controls to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gt215: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/nv04: avoid creation of output paths (bsc#1095094).\n- drm/nouveau/disp/nv50-: avoid creating ORs that are not present on HW (bsc#1095094).\n- drm/nouveau/disp/nv50-: execute supervisor on its own workqueue (bsc#1095094).\n- drm/nouveau/disp/nv50-: fetch head/OR state at beginning of supervisor (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 1.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.1 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.2 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 3.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR manual sink detection to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR power state control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-gt21x: remove workaround for dp-\u003etmds hotplug issues (bsc#1095094).\n- drm/nouveau/disp: Add mechanism to convert HDMI InfoFrames to hardware format (bsc#1095094).\n- drm/nouveau/disp: Silence DCB warnings (bsc#1095094).\n- drm/nouveau/disp: add tv encoders to output resource mapping (bsc#1095094).\n- drm/nouveau/disp: common implementation of scanoutpos method in nvkm_head (bsc#1095094).\n- drm/nouveau/disp: delay output path / connector construction until oneinit() (bsc#1095094).\n- drm/nouveau/disp: fork off some new hw-specific implementations (bsc#1095094).\n- drm/nouveau/disp: identity-map display paths to output resources (bsc#1095094).\n- drm/nouveau/disp: introduce acquire/release display path methods (bsc#1095094).\n- drm/nouveau/disp: introduce input/output resource abstraction (bsc#1095094).\n- drm/nouveau/disp: introduce object to track per-head functions/state (bsc#1095094).\n- drm/nouveau/disp: move vblank_{get,put} methods into nvkm_head (bsc#1095094).\n- drm/nouveau/disp: remove hw-specific customisation of output paths (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output to nvkm_outp (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output_dp to nvkm_dp (bsc#1095094).\n- drm/nouveau/disp: s/nvkm_connector/nvkm_conn/ (bsc#1095094).\n- drm/nouveau/disp: shuffle functions around (bsc#1095094).\n- drm/nouveau/falcon: use a more reasonable msgqueue timeout value (bsc#1095094).\n- drm/nouveau/fb/gf100-: zero mmu debug buffers (bsc#1095094).\n- drm/nouveau/fb/ram/nv40-: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/fbcon: fix oops without fbdev emulation (bsc#1094751).\n- drm/nouveau/hwmon: Add config for all sensors and their settings (bsc#1095094).\n- drm/nouveau/hwmon: Add nouveau_hwmon_ops structure with .is_visible/.read_string (bsc#1095094).\n- drm/nouveau/hwmon: Change permissions to numeric (bsc#1095094).\n- drm/nouveau/hwmon: Remove old code, add .write/.read operations (bsc#1095094).\n- drm/nouveau/hwmon: expose the auto_point and pwm_min/max attrs (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: improve overlay error detection, fix pitch setting (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: prevent undisplayable framebuffers from creation (bsc#1095094).\n- drm/nouveau/kms/nv04-nv4x: fix exposed format list (bsc#1095094).\n- drm/nouveau/kms/nv04: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/kms/nv10-nv40: add NV21 support to overlay (bsc#1095094).\n- drm/nouveau/mc/gf100: add pmu to reset mask (bsc#1095094).\n- drm/nouveau/mpeg: print more debug info when rejecting dma objects (bsc#1095094).\n- drm/nouveau/pmu/fuc: do not use movw directly anymore (bsc#1051510).\n- drm/nouveau/pmu/gt215-: abstract detection of whether reset is needed (bsc#1095094).\n- drm/nouveau/pmu/gt215: fix reset (bsc#1095094).\n- drm/nouveau/tegra: Do not leave GPU in reset (bsc#1095094).\n- drm/nouveau/tegra: Skip manual unpowergating when not necessary (bsc#1095094).\n- drm/nouveau/therm/gm200: Added (bsc#1095094).\n- drm/nouveau/therm: fix spelling mistake on array thresolds (bsc#1095094).\n- drm/nouveau/tmr: remove nvkm_timer_alarm_cancel() (bsc#1095094).\n- drm/nouveau: Clean up nv50_head_atomic_check_mode() and fix blankus calculation (bsc#1095094).\n- drm/nouveau: Convert nouveau to use new iterator macros, v2 (bsc#1095094).\n- drm/nouveau: Drop drm_vblank_cleanup (bsc#1095094).\n- drm/nouveau: Enable stereoscopic 3D output over HDMI (bsc#1095094).\n- drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (bsc#1051510).\n- drm/nouveau: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/nouveau: Fix merge commit (bsc#1095094).\n- drm/nouveau: Handle drm_atomic_helper_swap_state failure (bsc#1095094).\n- drm/nouveau: Handle frame-packing mode geometry and timing effects (bsc#1095094).\n- drm/nouveau: Pass mode-dependent AVI and Vendor HDMI InfoFrames to NVKM (bsc#1095094).\n- drm/nouveau: Skip vga_fini on non-PCI device (bsc#1095094).\n- drm/nouveau: Use the drm_driver.dumb_destroy default (bsc#1095094).\n- drm/nouveau: silence suspend/resume debugging messages (bsc#1095094).\n- drm/nouveau: use drm_for_each_connector_iter() (bsc#1095094).\n- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bsc#1051510).\n- drm/omap: fix possible NULL ref issue in tiler_reserve_2d (bsc#1051510).\n- drm/omap: fix uninitialized ret variable (bsc#1051510).\n- drm/omap: handle alloc failures in omap_connector (bsc#1051510).\n- drm/omap: silence unititialized variable warning (bsc#1051510).\n- drm/panel: simple: Fix the bus format for the Ontat panel (bsc#1051510).\n- drm/psr: Fix missed entry in PSR setup time table (bsc#1051510).\n- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510).\n- drm/radeon: Fix PCIe lane width calculation (bsc#1051510).\n- drm/radeon: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/radeon: add PX quirk for Asus K73TK (bsc#1051510).\n- drm/radeon: make MacBook Pro d3_delay quirk more generic (bsc#1051510).\n- drm/rockchip: Clear all interrupts before requesting the IRQ (bsc#1051510).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bsc#1051510).\n- drm/rockchip: dw-mipi-dsi: fix possible un-balanced runtime PM enable (bsc#1051510).\n- drm/sun4i: Fix dclk_set_phase (bsc#1051510).\n- drm/sun4i: Fix error path handling (bsc#1051510).\n- drm/tegra: Shutdown on driver unbind (bsc#1051510).\n- drm/tilcdc: ensure nonatomic iowrite64 is not used (bsc#1051510).\n- drm/vc4: Fix memory leak during BO teardown (bsc#1051510).\n- drm/vc4: Fix scaling of uni-planar formats (bsc#1051510).\n- drm/virtio: fix vq wait_event condition (bsc#1051510).\n- drm/vmwgfx: Fix 32-bit VMW_PORT_HB_[IN|OUT] macros (bsc#1051510).\n- drm/vmwgfx: Fix a buffer object leak (bsc#1051510).\n- drm/vmwgfx: Set dmabuf_size when vmw_dmabuf_init is successful (bsc#1051510).\n- drm/vmwgfx: Unpin the screen object backup buffer when not used (bsc#1051510).\n- drm: Allow determining if current task is output poll worker (bsc#1051510).\n- drm: Match sysfs name in link removal to link creation (bsc#1051510).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs (bsc#1051510).\n- drm: nouveau: remove dead code and pointless local lut storage (bsc#1095094).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen2 (bsc#1051510).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen3 (bsc#1051510).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bsc#1051510).\n- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).\n- eCryptfs: do not pass up plaintext names when using filename encryption (bsc#1052766).\n- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918).\n- efi/esrt: Use memunmap() instead of kfree() to free the remapping (bsc#1051510).\n- emulex/benet: Constify *be_misconfig_evt_port_state (bsc#1086288).\n- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282).\n- ethernet: Use octal not symbolic permissions (bsc#1086288).\n- ethtool: do not print warning for applications using legacy API (networking-stable-18_01_12).\n- etnaviv: fix gem object list corruption (bsc#1051510).\n- etnaviv: fix submit error path (bsc#1051510).\n- ext4: add bounds checking to ext4_xattr_find_entry() (bsc#1052766).\n- ext4: do not update checksum of new initialized bitmaps (bsc#1052766).\n- ext4: eliminate sleep from shutdown ioctl (bsc#1052766).\n- ext4: fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: fix offset overflow on 32-bit archs in ext4_iomap_begin() (bsc#1079747).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- ext4: move call to ext4_error() into ext4_xattr_check_block() (bsc#1052766).\n- ext4: pass -ESHUTDOWN code to jbd2 layer (bsc#1052766).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bsc#1052766).\n- ext4: protect i_disksize update by i_data_sem in direct write path (bsc#1052766).\n- ext4: set h_journal if there is a failure starting a reserved handle (bsc#1052766).\n- ext4: shutdown should not prevent get_write_access (bsc#1052766).\n- extcon: intel-cht-wc: Set direction and drv flags for V5 boost GPIO (bsc#1051510).\n- f2fs: avoid hungtask when GC encrypted block if io_bits is set (bsc#1052766).\n- f2fs: expose some sectors to user in inline data or dentry case (bsc#1052766).\n- f2fs: fix a panic caused by NULL flush_cmd_control (bsc#1086400).\n- f2fs: fix heap mode to reset it back (bsc#1052766).\n- f2fs: fix to clear CP_TRIMMED_FLAG (bsc#1052766).\n- f2fs: fix to wake up all sleeping flusher (bsc#1099918).\n- fanotify: fix logic of events on child (bsc#1052766).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bsc#1051510).\n- fealnx: Fix building error on MIPS (networking-stable-17_11_20).\n- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bsc#1051510).\n- firmware: add helper to unregister pm ops (bsc#1085937).\n- firmware: always enable the reboot notifier (bsc#1085937).\n- firmware: dmi_scan: Fix UUID length safety check (bsc#1051510).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bsc#1051510).\n- firmware: fix capturing errors on fw_cache_init() on early init (bsc#1085937).\n- firmware: fix checking for return values for fw_add_devm_name() (bsc#1051510).\n- firmware: fix detecting error on register_reboot_notifier() (bsc#1085936).\n- firmware: move kill_requests_without_uevent() up above (bsc#1085937).\n- firmware: provide helpers for registering the syfs loader (bsc#1085937).\n- firmware: share fw fallback killing on reboot/suspend (bsc#1085937).\n- flow_dissector: properly cap thoff field (networking-stable-18_01_28).\n- fs/aio: Add explicit RCU grace period when freeing kioctx (bsc#1088722).\n- fs/aio: Use RCU accessors for kioctx_table-\u003etable[] (bsc#1088722).\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142).\n- fs/fat/inode.c: fix sb_rdonly() change (bsc#1052766).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bsc#1052766).\n- fsnotify: Fix fsnotify_mark_connector race (bsc#1052766).\n- fsnotify: Hide kABI changes in fsnotify_mark_connector (bsc#1052766).\n- ftrace: Fix selftest goto location on error (bsc#1099918).\n- fuse: fix READDIRPLUS skipping an entry (bsc#1088690).\n- geneve: Fix function matching VNI and tunnel ID on big-endian (bsc#1051510).\n- geneve: fix fill_info when link down (bsc#1051510).\n- gfs2: Fix debugfs glocks dump (bsc#1052766).\n- gpio: No NULL owner (bsc#1051510).\n- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bsc#1051510).\n- gpio: davinci: Assign first bank regs for unbanked case (bsc#1051510).\n- gpio: fix \u0027gpio-line-names\u0027 property retrieval (bsc#1051510).\n- gpio: fix aspeed_gpio unmask irq (bsc#1051510).\n- gpio: fix error path in lineevent_create (bsc#1051510).\n- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- gpio: label descriptors using the device name (bsc#1051510).\n- gpio: stmpe: i2c transfer are forbiden in atomic context (bsc#1051510).\n- gpioib: do not free unrequested descriptors (bsc#1051510).\n- gpu: ipu-v3: pre: fix device node leak in ipu_pre_lookup_by_phandle (bsc#1051510).\n- gpu: ipu-v3: prg: avoid possible array underflow (bsc#1051510).\n- gpu: ipu-v3: prg: fix device node leak in ipu_prg_lookup_by_phandle (bsc#1051510).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1094420).\n- hwmon: (ina2xx) Fix access to uninitialized mutex (bsc#1051510).\n- hwmon: (ina2xx) Make calibration register value fixed (bsc#1051510).\n- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510).\n- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510).\n- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510).\n- hwtracing: stm: fix build error on some arches (bsc#1051510).\n- i2c: designware: fix poll-after-enable regression (bsc#1051510).\n- i2c: i801: Restore configuration at shutdown (bsc#1051510).\n- i2c: i801: Save register SMBSLVCMD value only once (bsc#1051510).\n- i2c: ismt: Separate I2C block read from SMBus block read (bsc#1051510).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bsc#1051510).\n- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510).\n- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510).\n- i2c: viperboard: return message count on master_xfer success (bsc#1051510).\n- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821).\n- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978).\n- i40e: Fix attach VF to VM issue (bsc#1056658 bsc#1056662).\n- i40e: Fix the number of queues available to be mapped for use (bsc#1094978).\n- i40e: program fragmented IPv4 filter input set (bsc#1056658 bsc#1056662).\n- i40evf: Do not schedule reset_task when device is being removed (bsc#1056658 bsc#1056662).\n- i40evf: do not rely on netif_running() outside rtnl_lock() (bsc#1056658 bsc#1056662).\n- i40evf: ignore link up if not running (bsc#1056658 bsc#1056662).\n- i40iw: Zero-out consumer key on allocate stag for FMR (bsc#1058659).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918).\n- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918).\n- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918).\n- idr: fix invalid ptr dereference on item delete (bsc#1051510).\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28).\n- igb: Allow to remove administratively set MAC on VFs (bsc#1056651).\n- igb: Clear TXSTMP when ptp_tx_work() is timeout (bsc#1056651).\n- igb: Fix a test with HWTSTAMP_TX_ON (bsc#1056651 bsc#1056643).\n- iio: ABI: Fix name of timestamp sysfs file (bsc#1051510).\n- iio: ad7793: Fix the serial interface reset (bsc#1051510).\n- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510).\n- iio: ad_sigma_delta: Implement a dedicated reset function (bsc#1051510).\n- iio: adc/accel: Fix up module licenses (bsc#1051510).\n- iio: adc: cpcap: fix incorrect validation (bsc#1051510).\n- iio: adc: mcp320x: Fix oops on module unload (bsc#1051510).\n- iio: adc: mcp320x: Fix readout of negative voltages (bsc#1051510).\n- iio: adc: meson-saradc: fix the bit_idx of the adc_en clock (bsc#1051510).\n- iio: adc: stm32: fix scan of multiple channels with DMA (bsc#1051510).\n- iio: adc: ti-ads1015: add 10% to conversion wait time (bsc#1051510).\n- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adc: twl4030: Fix an error handling path in \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adis_lib: Initialize trigger before requesting interrupt (bsc#1051510).\n- iio: buffer: check if a buffer has been set up when poll is called (bsc#1051510).\n- iio: buffer: fix the function signature to match implementation (bsc#1051510).\n- iio: core: Return error for failed read_reg (bsc#1051510).\n- iio: fix kernel-doc build errors (bsc#1051510).\n- iio: health: max30102: Add power enable parameter to get_temp function (bsc#1051510).\n- iio: health: max30102: Temperature should be in milli Celsius (bsc#1051510).\n- iio: imu: st_lsm6dsx: fix endianness in st_lsm6dsx_read_oneshot() (bsc#1051510).\n- iio: st_pressure: st_accel: Initialise sensor platform data properly (bsc#1051510).\n- iio: st_pressure: st_accel: pass correct platform data to init (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: preset shouldn\u0027t be buffered (bsc#1051510).\n- iio:buffer: make length types match kfifo types (bsc#1051510).\n- iio:kfifo_buf: check for uint overflow (bsc#1051510).\n- ima: Fallback to the builtin hash algorithm (bsc#1091686).\n- infiniband: drop unknown function from core_priv.h (bsc#1046306).\n- init: fix false positives in W+X checking (bsc#1093721).\n- initial support (display-only) for GP108 (bsc#1095094).\n- intel_th: Use correct device when freeing buffers (bsc#1051510).\n- iommu/amd: Take into account that alloc_dev_data() may return NULL (bsc#975772).\n- iommu/vt-d: Clear pasid table entry when memory unbound (bsc#1087214).\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).\n- iov_iter: fix memory leak in pipe_get_pages_alloc() (bsc#1092710).\n- iov_iter: fix return type of __pipe_get_pages() (bsc#1092710).\n- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_gre: fix device features for ioctl setup (networking-stable-17_12_31).\n- ip6_gre: init dev-\u003emtu and dev-\u003ehard_header_len correctly (networking-stable-18_01_28).\n- ip6_gre: ip6gre_tap device should keep dst (networking-stable-17_10_09).\n- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (networking-stable-17_11_14).\n- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (networking-stable-17_10_09).\n- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (networking-stable-18_01_12).\n- ip6_tunnel: do not allow loading ip6_tunnel if ipv6 is disabled in cmdline (networking-stable-17_10_09).\n- ip6_vti: adjust vti mtu according to mtu of lower device (bsc#1082869).\n- ip6mr: fix stale iterator (networking-stable-18_02_06).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes).\n- ip_gre: fix IFLA_MTU ignored on NEWLINK (bsc#1076830).\n- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipip: only increase err_count for some certain type icmp in ipip_err (networking-stable-17_11_14).\n- ipv4: Fix use-after-free when flushing FIB tables (networking-stable-17_12_31).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28).\n- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15).\n- ipv4: igmp: guard against silly MTU values (bsc#1082869).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (git-fixes).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26).\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28).\n- ipv6: flowlabel: do not leave opt-\u003etot_len with garbage (networking-stable-17_11_14).\n- ipv6: mcast: better catch silly mtu values (networking-stable-17_12_31).\n- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes).\n- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28).\n- ipv6: sr: fix TLVs not being copied using setsockopt (networking-stable-18_01_12).\n- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28).\n- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10).\n- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10).\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bsc#1098401).\n- isdn: eicon: fix a missing-check bug (bsc#1051510).\n- iw_cxgb4: Atomically flush per QP HW CQEs (bsc#1046543).\n- iw_cxgb4: Fix an error handling path in \u0027c4iw_get_dma_mr()\u0027 (bsc#1064802 bsc#1066129).\n- iw_cxgb4: print mapped ports correctly (bsc#1046543).\n- iwlmvm: tdls: Check TDLS channel switch support (bsc#1051510).\n- iwlwifi: add a bunch of new 9000 PCI IDs (1051510).\n- iwlwifi: add shared clock PHY config flag for some devices (bsc#1051510).\n- iwlwifi: avoid collecting firmware dump if not loaded (bsc#1051510).\n- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1051510).\n- iwlwifi: fw: harden page loading code (bsc#1051510).\n- iwlwifi: mvm: Correctly set IGTK for AP (bsc#1051510).\n- iwlwifi: mvm: Correctly set the tid for mcast queue (bsc#1051510).\n- iwlwifi: mvm: Direct multicast frames to the correct station (bsc#1051510).\n- iwlwifi: mvm: Fix channel switch for count 0 and 1 (bsc#1051510).\n- iwlwifi: mvm: Increase session protection time after CS (bsc#1051510).\n- iwlwifi: mvm: always init rs with 20mhz bandwidth rates (bsc#1051510).\n- iwlwifi: mvm: clear tx queue id when unreserving aggregation queue (bsc#1051510).\n- iwlwifi: mvm: do not warn in queue sync on RF-kill (bsc#1051510).\n- iwlwifi: mvm: fix \u0027failed to remove key\u0027 message (bsc#1051510).\n- iwlwifi: mvm: fix IBSS for devices that support station type API (bsc#1051510).\n- iwlwifi: mvm: fix TSO with highly fragmented SKBs (bsc#1051510).\n- iwlwifi: mvm: fix TX of CCMP 256 (bsc#1051510).\n- iwlwifi: mvm: fix array out of bounds reference (bsc#1051510).\n- iwlwifi: mvm: fix assert 0x2B00 on older FWs (bsc#1051510).\n- iwlwifi: mvm: fix error checking for multi/broadcast sta (bsc#1051510).\n- iwlwifi: mvm: fix race in queue notification wait (bsc#1051510).\n- iwlwifi: mvm: fix security bug in PN checking (bsc#1051510).\n- iwlwifi: mvm: honor the max_amsdu_subframes limit (bsc#1051510).\n- iwlwifi: mvm: make sure internal station has a valid id (bsc#1051510).\n- iwlwifi: mvm: remove DQA non-STA client mode special case (bsc#1051510).\n- iwlwifi: mvm: set the correct tid when we flush the MCAST sta (bsc#1051510).\n- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510).\n- ixgbe: do not set RXDCTL.RLPML for 82599 (bsc#1056657).\n- ixgbe: prevent ptp_rx_hang from running when in FILTER_ALL mode (bsc#1056657 bsc#1056653).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bsc#1052766).\n- jffs2_kill_sb(): deal with failed allocations (bsc#1052766).\n- kABI: protect ife_tlv_meta_decode (kabi).\n- kABI: protect struct cstate (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect tap_create_cdev (kabi).\n- kabi protect struct acpi_nfit_desc (bsc#1091424).\n- kabi/severities: Ignore kABI incompatibility for meson drm The symbols are used only between meson modules, so mostly internal.\n- kabi/severities: Ignore removed bugs.c symbols The second wave of SSBD patches drops those symbols and we can ignore them from kABI because nothing external should use them - they were exported only for kvm.\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 for above change.\n- kabi/severities: add nvdimm internal symbols to kabi ignore list\n- kabi: add struct bpf_map back (References: bsc#1098425).\n- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510).\n- kconfig: Do not leak main menus during parsing (bsc#1051510).\n- kconfig: Fix automatic menu creation mem leak (bsc#1051510).\n- kconfig: Fix expr_free() E_NOT leak (bsc#1051510).\n- kernel-binary: also default klp_symbols to 0 here.\n- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.\n- kernel-binary: pass MAKE_ARGS to install script as well.\n- kernel-{binary,docs}.spec sort dependencies.\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (Git-fixes).\n- kernel/async.c: revert \u0027async: simplify lowest_in_progress()\u0027 (Git-fixes).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510).\n- kernel/relay.c: revert \u0027kernel/relay.c: fix potential memory leak\u0027 (Git-fixes).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (Git-fixes).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (Git-fixes).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (Git-fixes).\n- kexec: export PG_swapbacked to VMCOREINFO (bsc#1088354).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1089268).\n- klp_symbols: make --klp-symbols argument semantic sane It selects build of klp symbols and defaults to off\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kobject: do not use WARN for registration failures (bsc#1051510).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).\n- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26).\n- l2tp: do not accept arbitrary sockets (bsc#1076830).\n- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10).\n- leds: pm8058: Silence pointer to integer size warning (bsc#1051510).\n- lib/kobject: Join string literals back (bsc#1051510).\n- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918).\n- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510).\n- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510).\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510).\n- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510).\n- libata: zpodd: small read overflow in eject_tray() (bsc#1051510).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: adding missing message types to ceph_msg_type_name() (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, btt: add a couple of missing kernel-doc lines (bsc#1087210).\n- libnvdimm, btt: clean up warning and error messages (bsc#1087205).\n- libnvdimm, btt: fix format string warnings (bsc#1087205).\n- libnvdimm, dimm: handle EACCES failures from label reads ().\n- libnvdimm, label: change min label storage size per UEFI 2.7 (bsc#1091666).\n- libnvdimm, namespace: use a safe lookup for dimm device name (bsc#1095321).\n- libnvdimm, nfit: fix persistence domain reporting (bsc#1091424).\n- libnvdimm, pmem: Add sysfs notifications to badblocks ().\n- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424).\n- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424).\n- libnvdimm, region, pmem: fix \u0027badblocks\u0027 sysfs_get_dirent() reference lifetime ().\n- libnvdimm, region: hide persistence_domain when unknown (bsc#1091424).\n- libnvdimm: expose platform persistence attribute for nd_region (bsc#1091424).\n- libnvdimm: re-enable deep flush for pmem devices via fsync() (bsc#1091424).\n- llc: better deal with too small mtu (networking-stable-18_05_15).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26).\n- llc: hold llc_sap before release_sock() (networking-stable-18_04_26).\n- lock_parent() needs to recheck if dentry got __dentry_kill\u0027ed under it (bsc#1052766).\n- locking/atomics, dm-integrity: Convert ACCESS_ONCE() to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/qspinlock: Ensure node is initialised before updating prev-\u003enext (bsc#1050549).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bsc#1050549).\n- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549).\n- loop: handle short DIO reads (bsc#1052766).\n- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510).\n- mac80211: Adjust SAE authentication timeout (bsc#1051510).\n- mac80211: Do not disconnect on invalid operating class (bsc#1051510).\n- mac80211: Fix condition validating WMM IE (bsc#1051510).\n- mac80211: Fix sending ADDBA response for an ongoing session (bsc#1051510).\n- mac80211: Fix setting TX power on monitor interfaces (bsc#1051510).\n- mac80211: drop frames with unexpected DS bits from fast-rx to slow path (bsc#1051510).\n- mac80211: mesh: fix wrong mesh TTL offset calculation (bsc#1051510).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bsc#1051510).\n- mac80211: use timeout from the AddBA response instead of the request (bsc#1051510).\n- macros.kernel-source: Fix building non-x86 KMPs\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.\n- macvlan: filter out unsupported feature flags (networking-stable-18_03_28).\n- macvlan: fix memory hole in macvlan_dev (bsc#1099918).\n- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510).\n- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510).\n- mbcache: initialize entry-\u003ee_referenced in mb_cache_entry_create() (bsc#1052766).\n- md-cluster: choose correct label when clustered layout is not supported (bsc#1093023).\n- md-cluster: do not update recovery_offset for faulty device (bsc#1093023).\n- md-cluster: make function cluster_check_sync_size static (bsc#1093023).\n- md-multipath: Use seq_putc() in multipath_status() (bsc#1093023).\n- md/bitmap: clear BITMAP_WRITE_ERROR bit before writing it to sb (bsc#1093023).\n- md/bitmap: copy correct data for bitmap super (bsc#1093023).\n- md/bitmap: revert a patch (bsc#1093023).\n- md/r5cache: call mddev_lock/unlock() in r5c_journal_mode_show (bsc#1093023).\n- md/r5cache: fix io_unit handling in r5l_log_endio() (bsc#1093023).\n- md/r5cache: move mddev_lock() out of r5c_journal_mode_set() (bsc#1093023).\n- md/r5cache: print more info of log recovery (bsc#1093023).\n- md/raid0: attach correct cgroup info in bio (bsc#1093023).\n- md/raid1,raid10: silence warning about wait-within-wait (bsc#1093023).\n- md/raid1/10: add missed blk plug (bsc#1093023).\n- md/raid1: Fix trailing semicolon (bsc#1093023).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (bsc#1093023).\n- md/raid1: fix NULL pointer dereference (bsc#1093023).\n- md/raid5: cap worker count (bsc#1093023).\n- md/raid5: correct degraded calculation in raid5_error (bsc#1093023).\n- md/raid5: simplify uninitialization of shrinker (bsc#1093023).\n- md: Delete gendisk before cleaning up the request queue (bsc#1093023).\n- md: allow metadata update while suspending (bsc#1093023).\n- md: always hold reconfig_mutex when calling mddev_suspend() (bsc#1093023).\n- md: be cautious about using -\u003ecurr_resync_completed for -\u003erecovery_offset (bsc#1093023).\n- md: do not call bitmap_create() while array is quiesced (bsc#1093023).\n- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (bsc#1093023).\n- md: document lifetime of internal rdev pointer (bsc#1093023).\n- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1093023).\n- md: fix a race condition for flush request handling (bsc#1093023).\n- md: fix deadlock error in recent patch (bsc#1093023).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1098176).\n- md: forbid a RAID5 from having both a bitmap and a journal (bsc#1093023).\n- md: free unused memory after bitmap resize (bsc#1093023).\n- md: limit mdstat resync progress to max_sectors (bsc#1093023).\n- md: move suspend_hi/lo handling into core md code (bsc#1093023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1093023).\n- md: raid10: remove VLAIS (bsc#1093023).\n- md: raid10: remove a couple of redundant variables and initializations (bsc#1093023).\n- md: raid5: avoid string overflow warning (bsc#1093023).\n- md: release allocated bitset sync_set (bsc#1093023).\n- md: remove redundant variable q (bsc#1093023).\n- md: remove special meaning of -\u003equiesce(.., 2) (bsc#1093023).\n- md: rename some drivers/md/ files to have an \u0027md-\u0027 prefix (bsc#1093023).\n- md: replace seq_release_private with seq_release (bsc#1093023).\n- md: separate request handling (bsc#1093023).\n- md: use TASK_IDLE instead of blocking signals (bsc#1093023).\n- md: use lockdep_assert_held (bsc#1093023).\n- md: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1093023).\n- media: atomisp_fops.c: disable atomisp_compat_ioctl32 (bsc#1051510).\n- media: au0828: add VIDEO_V4L2 dependency (bsc#1051510).\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bsc#1051510).\n- media: cx23885: Set subdev host data to clk_freq pointer (bsc#1051510).\n- media: dmxdev: fix error code for invalid ioctls (bsc#1051510).\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510).\n- media: em28xx: Add Hauppauge SoloHD/DualHD bulk models (bsc#1051510).\n- media: em28xx: USB bulk packet size fix (bsc#1051510).\n- media: lgdt3306a: Fix a double kfree on i2c device remove (bsc#1051510).\n- media: lgdt3306a: Fix module count mismatch on usb unplug (bsc#1051510).\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).\n- media: uvcvideo: Support realtek\u0027s UVC 1.5 device (bsc#1099109).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bsc#1051510).\n- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510).\n- media: videobuf2-core: do not go out of the buffer range (bsc#1051510).\n- media: vivid: check if the cec_adapter is valid (bsc#1051510).\n- mei: me: add cannon point device ids ().\n- mei: me: add cannon point device ids for 4th device ().\n- mei: remove dev_err message on an unsupported ioctl (bsc#1051510).\n- mfd: cros ec: spi: Do not send first message too soon (bsc#1051510).\n- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510).\n- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510).\n- mkspec: only build docs for default variant kernel.\n- mlxsw: spectrum: Disable MAC learning for ovs port (networking-stable-17_12_31).\n- mlxsw: spectrum: Forbid linking to devices that have uppers FIX (stable-fixes).\n- mlxsw: spectrum: Prevent mirred-related crash on removal (networking-stable-17_10_09).\n- mlxsw: spectrum: Relax sanity checks during enslavement (networking-stable-18_01_12).\n- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28).\n- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28).\n- mlxsw: spectrum_router: Fix NULL pointer deref (networking-stable-18_01_12).\n- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07).\n- mlxsw: spectrum_router: Simplify a piece of code (networking-stable-18_01_12).\n- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07).\n- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, percpu: add support for __GFP_NOWARN flag (bsc#1089753).\n- mm, slab: reschedule cache_reap() on the same CPU (VM Functionality, bsc#1097796).\n- mm, swap: fix false error message in __swp_swapcount() (VM Functionality, bsc#1098043).\n- mm, swap: fix race between swap count continuation operations (VM Functionality, bsc#1097373). mm, swap: fix race between swap count continuation operations - KABI fix (VM Functionality, bsc#1097373).\n- mm, thp: do not cause memcg oom for thp (bnc#1089663).\n- mm/fadvise: discard partial page if endbyte is also EOF (bsc#1052766).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bsc#1052766).\n- mm/huge_memory.c: __split_huge_page() use atomic ClearPageDirty() (VM Functionality, bsc#1097800).\n- mm/khugepaged.c: convert VM_BUG_ON() to collapse fail (VM Functionality, bsc#1097468).\n- mm/ksm.c: fix inconsistent accounting of zero pages (VM Functionality, bsc#1097780).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (VM Functionality, bsc#1097465).\n- mm/page_owner: fix recursion bug after changing skip entries (VM Functionality, bsc#1097472).\n- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248).\n- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248).\n- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248).\n- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248).\n- mm/shmem: do not wait for lock_page() in shmem_unused_huge_shrink() (bnc#1089667).\n- mm/thp: do not wait for lock_page() in deferred_split_scan() (VM Functionality, bsc#1097470).\n- mm: Fix memory size alignment in devm_memremap_pages_release() (VM Functionality, bsc#1097439).\n- mm: fix device-dax pud write-faults triggered by get_user_pages() (bsc#1052766).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#971975 VM -- git fixes).\n- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1051510).\n- mmc: sdhci-iproc: add SDHCI_QUIRK2_HOST_OFF_CARD_ON for cygnus (bsc#1051510).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bsc#1051510).\n- mmc: sdhci-iproc: remove hard coded mmc cap 1.8v (bsc#1051510).\n- mmc: sdhci-pci: Fix voltage switch for some Intel host controllers (bsc#1051510).\n- mmc: sdhci-pci: Only do AMD tuning for HS200 (bsc#1051510).\n- mq-deadline: Enable auto-loading when built as module (bsc#1099918).\n- mremap: Remove LATENCY_LIMIT from mremap to reduce the number of TLB shootdowns (bnc#1095115).\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918).\n- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver \u003e= 2.0.0 (bsc#1099918).\n- mtd: partitions: add helper for deleting partition (bsc#1099918).\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (bsc#1051510).\n- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1051510).\n- n_tty: Access echo_* variables carefully (bsc#1051510).\n- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1094825).\n- nbd: do not start req until after the dead connection logic (bsc#1099918).\n- nbd: fix -ERESTARTSYS handling (bsc#1099918).\n- nbd: fix nbd device deletion (bsc#1099918).\n- nbd: fix return value in error handling path (bsc#1099918).\n- nbd: wait uninterruptible for the dead timeout (bsc#1099918).\n- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15).\n- net sched actions: return explicit error when tunnel_key mode is not specified (bsc#1056787).\n- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10).\n- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10).\n- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28).\n- net/mlx4_en: Fix an error handling path in \u0027mlx4_en_init_netdev()\u0027 (networking-stable-18_05_15).\n- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (networking-stable-18_05_15).\n- net/mlx5: Eliminate query xsrq dead code (bsc#1046303).\n- net/mlx5: Fix build break when CONFIG_SMP=n (bsc#1046303).\n- net/mlx5: Fix mlx5_get_vector_affinity function (bsc#1046303).\n- net/mlx5e: Allow offloading ipv4 header re-write for icmp (bsc#1046303).\n- net/mlx5e: Do not reset Receive Queue params on every type change (bsc#1046303).\n- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15).\n- net/mlx5e: Fixed sleeping inside atomic context (bsc#1046303).\n- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1046303).\n- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15).\n- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07).\n- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bsc#1056787).\n- net/sched: fix NULL dereference in the error path of tunnel_key_init() (bsc#1056787).\n- net/sched: fix NULL dereference on the error path of tcf_skbmod_init() (bsc#1056787).\n- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (networking-stable-17_11_20).\n- net/unix: do not show information about sockets from other namespaces (networking-stable-17_11_14).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bsc#1087092).\n- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28).\n- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28).\n- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28).\n- net: Set sk_prot_creator when cloning sockets to the right proto (networking-stable-17_10_09).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26).\n- net: bonding: Fix transmit load balancing in balance-alb mode if specified by sysfs (networking-stable-17_10_09).\n- net: bonding: fix tlb_dynamic_lb default value (networking-stable-17_10_09).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (networking-stable-17_12_31).\n- net: bridge: fix returning of vlan range op errors (networking-stable-17_11_14).\n- net: core: fix module type in sock_diag_bind (networking-stable-18_01_12).\n- net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY (networking-stable-17_12_31).\n- net: dsa: check master device before put (networking-stable-17_11_14).\n- net: dsa: mv88e6xxx: lock mutex when freeing IRQs (networking-stable-17_10_09).\n- net: emac: Fix napi poll list corruption (networking-stable-17_10_09).\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28).\n- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28).\n- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07).\n- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26).\n- net: ethtool: Add missing kernel doc for FEC parameters (bsc#1046540).\n- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28).\n- net: fec: defer probe if regulator is not ready (networking-stable-18_01_12).\n- net: fec: free/restore resource in related probe error pathes (networking-stable-18_01_12).\n- net: fec: restore dev_id in the cases of probe error (networking-stable-18_01_12).\n- net: fec: unmap the xmit buffer that are not transferred by DMA (networking-stable-17_12_31).\n- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26).\n- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10).\n- net: fool proof dev_valid_name() (networking-stable-18_04_10).\n- net: igmp: Use correct source address on IGMPv3 reports (networking-stable-17_12_31).\n- net: igmp: add a missing rcu locking section (git-fixes).\n- net: igmp: fix source address check for IGMPv3 reports (git-fixes).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07).\n- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (networking-stable-17_12_31).\n- net: phy: Fix mask value write on gmii2rgmii converter speed register (networking-stable-17_10_09).\n- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28).\n- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07).\n- net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well (networking-stable-17_12_31).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (networking-stable-17_12_31).\n- net: qcom/emac: specify the correct size when mapping a DMA buffer (networking-stable-17_10_09).\n- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28).\n- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319).\n- net: realtek: r8169: implement set_link_ksettings() (networking-stable-17_12_12).\n- net: reevalulate autoflowlabel setting after sysctl setting (networking-stable-17_12_31).\n- net: remove hlist_nulls_add_tail_rcu() (networking-stable-17_12_12).\n- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15).\n- net: sched: ife: check on metadata length (networking-stable-18_04_26).\n- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26).\n- net: sched: ife: signal not finding metaid (networking-stable-18_04_26).\n- net: sched: report if filter is too large to dump (networking-stable-18_03_07).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (networking-stable-18_01_12).\n- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15).\n- net: systemport: Correct IPG length settings (networking-stable-17_11_20).\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28).\n- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28).\n- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26).\n- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28).\n- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15).\n- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (networking-stable-17_11_20).\n- netfilter: use skb_to_full_sk in ip6_route_me_harder (bsc#1076830).\n- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes).\n- netlink: do not proceed if dump\u0027s start() errs (networking-stable-17_10_09).\n- netlink: do not set cb_running if dump\u0027s start() errs (networking-stable-17_11_14).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07).\n- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28).\n- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10).\n- netlink: put module reference if dump start fails (git-fixes).\n- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28).\n- nfit-test: Add platform cap support from ACPI 6.2a to test (bsc#1091424).\n- nfit: skip region registration for incomplete control regions (bsc#1091666).\n- nfp: use full 40 bits of the NSP buffer address (bsc#1055968).\n- nl80211: relax ht operation checks for mesh (bsc#1051510).\n- nubus: Avoid array underflow and overflow (bsc#1099918).\n- nubus: Fix up header split (bsc#1099918).\n- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706).\n- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706).\n- nvme-fabrics: centralize discovery controller defaults (bsc#1098706).\n- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: refactor queue ready check (bsc#1098706).\n- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706).\n- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706).\n- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706).\n- nvme-fc: release io queues to allow fast fail (bsc#1098706).\n- nvme-fc: remove reinit_request routine (bsc#1098706).\n- nvme-fc: remove setting DNR on exception conditions (bsc#1098706).\n- nvme-multipath: fix sysfs dangerously created links (bsc#1096529).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1099041).\n- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041).\n- nvme-rdma: do not override opts-\u003equeue_size (bsc#1099041).\n- nvme-rdma: fix error flow during mapping request data (bsc#1099041).\n- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041).\n- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706).\n- nvme: Set integrity flag for user passthrough commands (bsc#1098706).\n- nvme: Skip checking heads without namespaces (bsc#1098706).\n- nvme: Use admin command effects for admin commands (bsc#1098706).\n- nvme: add quirk to force medium priority for SQ creation ().\n- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706).\n- nvme: check return value of init_srcu_struct function (bsc#1098706).\n- nvme: do not send keep-alives to the discovery controller ().\n- nvme: expand nvmf_check_if_ready checks (bsc#1098706).\n- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706).\n- nvme: fix extended data LBA supported setting ().\n- nvme: fix lockdep warning in nvme_mpath_clear_current_path ().\n- nvme: fix potential memory leak in option parsing (bsc#1098706).\n- nvme: move init of keep_alive work item to controller initialization (bsc#1098706).\n- nvme: target: fix buffer overflow ().\n- nvmet-fc: increase LS buffer count per fc port (bsc#1098706).\n- nvmet: fix space padding in serial number ().\n- nvmet: switch loopback target state to connecting when resetting (bsc#1098706).\n- objtool, perf: Fix GCC 8 -Wrestrict error (Fix gcc 8 restrict error).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bsc#1052766).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1052766).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1052766).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bsc#1052766).\n- of: overlay: validate offset from property fixups (bsc#1051510).\n- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510).\n- of: unittest: for strings, account for trailing \\0 in property length field (bsc#1051510).\n- omapdrm: panel: fix compatible vendor string for td028ttec1 (bsc#1051510).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15).\n- ovl: Put upperdentry if ovl_check_origin() fails (bsc#1088704).\n- ovl: Return -ENOMEM if an allocation fails ovl_lookup() (bsc#1096065).\n- ovl: fix failure to fsync lower dir (bsc#108871).\n- ovl: fix lookup with middle layer opaque dir and absolute path redirects (bsc#1090605).\n- p54: do not unregister leds when they are not initialized (bsc#1051510).\n- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bsc#1051510).\n- partitions/msdos: Unable to mount UFS 44bsd partitions (bsc#1051510).\n- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510).\n- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510).\n- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510).\n- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510).\n- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510).\n- pinctrl: baytrail: Enable glitch filter for GPIOs used as interrupts (bsc#1051510).\n- pinctrl: denverton: Fix UART2 RTS pin mode (bsc#1051510).\n- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510).\n- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510).\n- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510).\n- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).\n- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510).\n- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510).\n- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510).\n- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510).\n- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510).\n- pipe: fix off-by-one error when checking buffer limits (bsc#1051510).\n- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918).\n- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918).\n- platform/chrome: Use proper protocol transfer function (bsc#1051510).\n- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510).\n- platform/x86: asus-wireless: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: fujitsu-laptop: Support Lifebook U7x7 hotkeys (bsc#1087284).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626).\n- platform/x86: thinkpad_acpi: suppress warning about palm detection (bsc#1051510).\n- power: supply: ab8500_charger: Bail out in case of error in \u0027ab8500_charger_init_hw_registers()\u0027 (bsc#1051510).\n- power: supply: ab8500_charger: Fix an error handling path (bsc#1051510).\n- power: supply: axp288_charger: Properly stop work on probe-error / remove (bsc#1051510).\n- powerpc/64s/idle: avoid sync for KVM state when waking from idle (bsc#1061840).\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/kvm: Fix guest boot failure on Power9 since DAWR changes (bsc#1061840).\n- powerpc/kvm: Fix lockups when running KVM guests on Power8 (bsc#1061840).\n- powerpc/livepatch: Fix KABI breaker in stacktrace.c (bsc#1071995 bsc#1072856 bsc#1087458 bsc#1089664 bsc#1089669).\n- powerpc/livepatch: Fix build error with kprobes disabled (bsc#1071995).\n- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes).\n- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc1056686).\n- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc1056686).\n- powerpc/perf: Fix kernel address leak via sampling registers (bsc1056686).\n- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc1056686).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bsc1056686).\n- powerpc/perf: Prevent kernel address leak via perf_get_data_addr() (bsc1056686).\n- powerpc/perf: fix bug references.\n- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes).\n- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248).\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918).\n- powerpc/xmon: Also setup debugger hooks when single-stepping (bsc#1072829).\n- powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths (bsc#1088804).\n- powerpc64/ftrace: Add helpers to hard disable ftrace (bsc#1088804).\n- powerpc64/ftrace: Delay enabling ftrace on secondary cpus (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during hotplug (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during kvm guest entry/exit (bsc#1088804).\n- powerpc64/ftrace: Rearrange #ifdef sections in ftrace.h (bsc#1088804).\n- powerpc64/ftrace: Use the generic version of ftrace_replace_code() (bsc#1088804).\n- powerpc64/kexec: Hard disable ftrace before switching to the new kernel (bsc#1088804).\n- powerpc64/module: Tighten detection of mcount call sites with -mprofile-kernel (bsc#1088804).\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).\n- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28).\n- ppp: fix race in ppp device destruction (networking-stable-17_11_14).\n- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07).\n- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28).\n- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (networking-stable-18_01_28).\n- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10).\n- printk: fix possible reuse of va_list variable (bsc#1100602).\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- ptr_ring: add barriers (networking-stable-17_12_31).\n- pty: cancel pty slave port buf\u0027s work in tty_release (bsc#1051510).\n- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510).\n- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510).\n- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510).\n- qed: Fix l2 initializations over iWARP personality (bsc#1050536 bsc#1050545).\n- qed: Fix non TCP packets should be dropped on iWARP ll2 connection (bsc#1050545).\n- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1050536 bsc#1050545).\n- qed: Use after free in qed_rdma_free() (bsc#1050536 bsc#1050545).\n- qede: Fix gfp flags sent to rdma event node allocation (bsc#1050538 bsc#1050545).\n- qede: Fix qedr link update (bsc#1050538 bsc#1050545).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: Add missing skb_reset_mac_header-call (networking-stable-17_11_20).\n- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06).\n- qmi_wwan: do not steal interfaces from class drivers (bsc#1092888).\n- r8169: fix powering up RTL8168h (bsc#1051510).\n- r8169: fix setting driver_data after register_netdev (bsc#1051510).\n- radeon: hide pointless #warning when compile testing (bsc#1051510).\n- radix tree test suite: add item_delete_rcu() (bsc#1095467).\n- radix tree test suite: fix compilation issue (bsc#1095467).\n- radix tree test suite: fix mapshift build target (bsc#1095467).\n- radix tree test suite: multi-order iteration race (bsc#1095467).\n- radix tree: fix multi-order iteration race (bsc#1095467).\n- raid10: check bio in r10buf_pool_free to void NULL pointer dereference (bsc#1098174).\n- raid1: copy write hint from master bio to behind bio (bsc#1093023).\n- raid1: prevent freeze_array/wait_all_barriers deadlock (bsc#1093023).\n- raid1: remove obsolete code in raid1_write_request (bsc#1093023).\n- raid5-ppl: PPL support for disks with write-back cache enabled (bsc#1093023).\n- raid5-ppl: fix handling flush requests (bsc#1093023).\n- raid5: Set R5_Expanded on parity devices as well as data (bsc#1093023).\n- raid5: remove raid5_build_block (bsc#1093023).\n- raid: remove tile specific raid6 implementation (bsc#1093023).\n- random: crng_reseed() should lock the crng instance that it is modifying (bsc#1051510).\n- random: use a different mixing algorithm for add_device_randomness() (bsc#1051510).\n- random: use a tighter cap in credit_entropy_bits_safe() (bsc#1051510).\n- rbd: use GFP_NOIO for parent stat and data requests (bsc#1093728).\n- rds: Incorrect reference counting in TCP socket creation (bsc#1076830).\n- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13).\n- rds: do not leak kernel memory to user land (networking-stable-18_05_15).\n- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029).\n- regulator: cpcap: Fix standby mode (bsc#1051510).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bsc#1051510).\n- resource: fix integer overflow at reallocation (bsc#1086739).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- rfkill: gpio: fix memory leak in probe error path (bsc#1051510).\n- rhashtable: Fix rhlist duplicates insertion (bsc#1051510).\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).\n- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06).\n- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10).\n- rpm/config.sh: Fixup BUGZILLA_PRODUCT variable\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995).\n- rpm/modules.fips include module list from dracut\n- rt2x00: do not pause queue unconditionally on error path (bsc#1051510).\n- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bsc#1051510).\n- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510).\n- rtc: pcf8563: fix output clock rate (bsc#1051510).\n- rtc: pl031: make interrupt optional (bsc#1051510).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bsc#1051510).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bsc#1051510).\n- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07).\n- s390/archrandom: Reconsider s390 arch random implementation (bnc#1096753, LTC#168037).\n- s390/archrandom: Rework arch random implementation (bnc#1096753, LTC#168037).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1093148, LTC#167307).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096753, LTC#168037).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093148, LTC#167307).\n- s390/qdio: do not merge ERROR output buffers (bsc#1099715).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1096753, LTC#168037).\n- s390/qeth: do not dump control cmd twice (bsc#1099715).\n- s390/qeth: fix IPA command submission race (networking-stable-18_03_07).\n- s390/qeth: fix IPA command submission race (bsc#1099715).\n- s390/qeth: fix MAC address update sequence (bnc#1093148, LTC#167307).\n- s390/qeth: fix overestimated count of buffer elements (bsc#1099715).\n- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07).\n- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28).\n- s390/qeth: free netdevice when removing a card (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093148, LTC#167307).\n- s390/qeth: use Read device to query hypervisor for MAC (bsc#1061024).\n- s390/qeth: when thread completes, wake up all waiters (bsc#1099715).\n- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1093148, LTC#167307).\n- s390/zcrypt: Fix CCA and EP11 CPRB processing failure memory leak (bnc#1096753, LTC#168037).\n- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28).\n- sched/numa: Stagger NUMA balancing scan periods for new threads (Automatic NUMA Balancing ()).\n- sched: Make resched_cpu() unconditional (Git-fixes).\n- sched: Stop resched_cpu() from sending IPIs to offline CPUs (Git-fixes).\n- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (Git-fixes).\n- scripts/git_sort/git_sort.py:\n- scripts/git_sort/git_sort.py: add Viro\u0027s vfs git\n- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918).\n- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).\n- scsi: ipr: new IOASC update (bsc#1097961).\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866).\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866).\n- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866).\n- scsi: lpfc: Correct fw download error message (bsc#1088866).\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866).\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088866).\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1088866).\n- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866).\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290).\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866).\n- scsi: lpfc: Fix MDS diagnostics failure (Rx andlt; Tx) (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866).\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866).\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866).\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866).\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866).\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866).\n- scsi: lpfc: Fix port initialization failure (bsc#1093290).\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866).\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866).\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866).\n- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866).\n- scsi: lpfc: fix spelling mistakes: \u0027mabilbox\u0027 and \u0027maibox\u0027 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866).\n- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084570).\n- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084570).\n- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084570).\n- scsi: qla2xxx: Delete session for nport id change (bsc#1077338).\n- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084570).\n- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084570).\n- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084570).\n- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084570).\n- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1077338).\n- scsi: qla2xxx: Remove nvme_done_list (bsc#1084570).\n- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084570).\n- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084570).\n- scsi: qla2xxx: Return busy if rport going away (bsc#1084570).\n- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084570).\n- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084570).\n- scsi: raid_class: Add \u0027JBOD\u0027 RAID level (bsc#1093023).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1099918).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15).\n- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26).\n- sctp: do not leak kernel memory to user space (networking-stable-18_04_10).\n- sctp: do not retransmit upon FragNeeded if PMTU discovery is disabled (networking-stable-18_01_12).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07).\n- sctp: fix the handling of ICMP Frag Needed for too small MTUs (networking-stable-18_01_12).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (networking-stable-18_05_15).\n- sctp: full support for ipv6 ip_nonlocal_bind and IP_FREEBIND (networking-stable-17_11_14).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes).\n- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (networking-stable-17_10_09).\n- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15).\n- sctp: reset owner sk for data chunks on out queues when migrating a sock (networking-stable-17_11_14).\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10).\n- sctp: use right member as the param of list_for_each_entry (git-fixes).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15).\n- sdhci: Advertise 2.0v supply on SDIO host controller (bsc#1051510).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510).\n- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510).\n- selinux: skip bounded transition processing if the policy isn\u0027t loaded (bsc#1051510).\n- serdev: fix memleak on module unload (bsc#1051510).\n- serdev: fix receive_buf return value when no callback (bsc#1051510).\n- serdev: fix registration of second slave (bsc#1051510).\n- serdev: ttyport: add missing open() error handling (bsc#1051510).\n- serdev: ttyport: add missing receive_buf sanity checks (bsc#1051510).\n- serdev: ttyport: enforce tty-driver open() requirement (bsc#1051510).\n- serdev: ttyport: fix NULL-deref on hangup (bsc#1051510).\n- serdev: ttyport: fix tty locking in close (bsc#1051510).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bsc#1051510).\n- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510).\n- serial: 8250_dw: Disable clock on error (bsc#1051510).\n- serial: 8250_fintek: Fix finding base_port with activated SuperIO (bsc#1051510).\n- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bsc#1051510).\n- serial: altera: ensure port-\u003eregshift is honored consistently (bsc#1051510).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: core: mark port as initialized in autoconfig (bsc#1051510).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bsc#1051510).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: omap: Fix EFR write on RTS deassertion (bsc#1051510).\n- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510).\n- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: sh-sci: Stop using printk format %pCr (bsc#1051510).\n- serial: sh-sci: prevent lockup on full TTY buffers (bsc#1051510).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510).\n- sget(): handle failures of register_shrinker() (bsc#1052766).\n- sh_eth: fix SH7757 GEther initialization (networking-stable-18_01_12).\n- sh_eth: fix TSU resource handling (networking-stable-18_01_12).\n- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28).\n- sky2: Increase D3 delay to sky2 stops working after suspend (bsc#1051510).\n- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13).\n- sock: free skb in skb_complete_tx_timestamp on error (networking-stable-17_12_31).\n- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06).\n- spi: Fix scatterlist elements size in spi_map_buf (bsc#1051510).\n- spi: a3700: Fix clk prescaling for coefficient over 15 (bsc#1051510).\n- spi: a3700: Return correct value on timeout detection (bsc#1051510).\n- spi: armada-3700: Fix failing commands with quad-SPI (bsc#1051510).\n- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bsc#1051510).\n- spi: atmel: init FIFOs before spi enable (bsc#1051510).\n- spi: bcm-qspi: Fix use after free in bcm_qspi_probe() in error path (bsc#1051510).\n- spi: imx: do not access registers while clocks disabled (bsc#1051510).\n- spi: sh-msiof: Fix DMA transfer size check (bsc#1051510).\n- spi: spi-axi: fix potential use-after-free after deregistration (bsc#1051510).\n- spi: sun4i: disable clocks in the remove function (bsc#1051510).\n- spi: sun6i: disable/unprepare clocks on remove (bsc#1051510).\n- spi: xilinx: Detect stall with Unknown commands (bsc#1051510).\n- srcu: Provide ordering for CPU not involved in grace period (bsc#1052766).\n- staging: bcm2835-audio: Release resources on module_exit() (bsc#1051510).\n- staging: comedi: fix comedi_nsamples_left (bsc#1051510).\n- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bsc#1051510).\n- staging: iio: ad5933: switch buffer mode to software (bsc#1051510).\n- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bsc#1051510).\n- staging: iio: adc: ad7192: fix external frequency setting (bsc#1051510).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bsc#1051510).\n- staging: vchiq_2835_arm: Fix NULL ptr dereference in free_pagelist (bsc#1051510).\n- staging: wilc1000: Fix bssid buffer offset in Txq (bsc#1051510).\n- stm class: Fix a use-after-free (bsc#1051510).\n- stm class: Use vmalloc for the master map (bsc#1051510).\n- stmmac: reset last TSO segment size after device open (networking-stable-17_12_12).\n- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26).\n- strparser: Fix incorrect strp-\u003eneed_bytes value (networking-stable-18_04_26).\n- strparser: Fix sign of err codes (networking-stable-18_04_10).\n- sunrpc: remove incorrect HMAC request initialization (bsc#1051510).\n- supported.conf: Remove external flag from iwlwifi modules (bsc#1093273)\n- supported.conf: fix folder of the driver module\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510).\n- swiotlb: suppress warning when __GFP_NOWARN is set (bsc#1051510).\n- tap: reference to KVA of an unloaded module causes kernel panic (networking-stable-17_11_14).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26).\n- tcp: fix data delivery rate (networking-stable-17_10_09).\n- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26).\n- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06).\n- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07).\n- tcp: revert F-RTO middle-box workaround (bsc#1076830).\n- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15).\n- tcp_bbr: record \u0027full bw reached\u0027 decision in new full_bw_reached bit (networking-stable-17_12_31).\n- tcp_bbr: reset full pipe detection on loss recovery undo (networking-stable-17_12_31).\n- tcp_bbr: reset long-term bandwidth sampling on loss recovery undo (networking-stable-17_12_31).\n- tcp_nv: fix division by zero in tcpnv_acked() (networking-stable-17_11_20).\n- team: Fix double free in error path (networking-stable-18_03_28).\n- team: avoid adding twice the same option to the event list (networking-stable-18_04_26).\n- team: fix netconsole setup over team (networking-stable-18_04_26).\n- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10).\n- tee: check shm references are consistent in offset/size (bsc#1051510).\n- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510).\n- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510).\n- tg3: APE heartbeat changes (bsc#1086286).\n- tg3: Add Macronix NVRAM support (bsc#1086286).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286).\n- tg3: prevent scheduling while atomic splat (bsc#1086286).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bsc#1051510).\n- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510).\n- thermal: enable broadcom menu for arm64 bcm2835 (bsc#1095573).\n- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510).\n- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510).\n- thermal: imx: Fix race condition in imx_thermal_probe() (bsc#1051510).\n- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510).\n- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510).\n- thermal: power_allocator: fix one race condition issue for thermal_instances list (bsc#1051510).\n- thunderbolt: Prevent crash when ICM firmware is not running (bsc#1090888).\n- thunderbolt: Resume control channel after hibernation image is created (bsc#1051510).\n- thunderbolt: Serialize PCIe tunnel creation with PCI rescan (bsc#1090888).\n- thunderbolt: Wait a bit longer for ICM to authenticate the active NVM (bsc#1090888).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918).\n- timers: Invoke timer_start_debug() where it makes sense (Git-fixes).\n- timers: Reinitialize per cpu bases on hotplug (Git-fixes).\n- timers: Unconditionally check deferrable base (Git-fixes).\n- timers: Use deferrable base independent of base::nohz_active (Git-fixes).\n- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26).\n- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28).\n- tipc: fix hanging poll() for stream sockets (networking-stable-17_12_31).\n- tipc: fix memory leak in tipc_accept_from_sock() (networking-stable-17_12_12).\n- tools headers: Restore READ_ONCE() C++ compatibility (bsc#1093023).\n- tools/lib/subcmd/pager.c: do not alias select() params (Fix gcc 8 restrict error).\n- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bsc#1099918).\n- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918).\n- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918).\n- tracing: Make the snapshot trigger work with instances (bsc#1099918).\n- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918).\n- tty fix oops when rmmod 8250 (bsc#1051510).\n- tty/serial: atmel: add new version check for usart (bsc#1051510).\n- tty/serial: atmel: use port-\u003ename as name in request_irq() (bsc#1051510).\n- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510).\n- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510).\n- tty: fix __tty_insert_flip_char regression (bsc#1051510).\n- tty: fix tty_ldisc_receive_buf() documentation (bsc#1051510).\n- tty: improve tty_insert_flip_char() fast path (bsc#1051510).\n- tty: improve tty_insert_flip_char() slow path (bsc#1051510).\n- tty: make n_tty_read() always abort if hangup is in progress (bsc#1051510).\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bsc#1051510).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510).\n- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510).\n- tty: vt: fix up tabstops properly (bsc#1051510).\n- tun/tap: sanitize TUNSETSNDBUF input (networking-stable-17_11_14).\n- tun: allow positive return values on dev_get_valid_name() call (networking-stable-17_11_14).\n- tun: bail out from tun_get_user() if the skb is empty (networking-stable-17_10_09).\n- tun: call dev_get_valid_name() before register_netdevice() (networking-stable-17_11_14).\n- ubi: Fix error for write access (bsc#1051510).\n- ubi: Fix race condition between ubi volume creation and udev (bsc#1051510).\n- ubi: Reject MLC NAND (bsc#1051510).\n- ubi: block: Fix locking for idr_alloc/idr_remove (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Do not flush fastmap work on detach (bsc#1051510).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bsc#1051510).\n- ubifs: Check ubifs_wbuf_sync() return code (bsc#1052766).\n- ubifs: free the encrypted symlink target (bsc#1052766).\n- udf: Avoid overflow when session starts at large offset (bsc#1052766).\n- udf: Fix leak of UTF-16 surrogates into encoded strings (bsc#1052766).\n- usb: core: Add quirk for HP v222w 16GB Mini (bsc#1090888).\n- usb: quirks: add control message delay for 1b1c:1b20 (bsc#1087092).\n- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132).\n- usb: typec: ucsi: Increase command completion timeout value (bsc#1090888).\n- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132).\n- usb: xhci: Disable slot even when virt-dev is null (bsc#1085539).\n- usb: xhci: Fix potential memory leak in xhci_disable_slot() (bsc#1085539).\n- usb: xhci: Make some static functions global ().\n- usbip: usbip_host: delete device from busid_table after rebind (bsc#1096480).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bsc#1096480).\n- usbip: usbip_host: run rebind from exit when module is removed (bsc#1096480).\n- usbip: vudc: fix null pointer dereference on udc-\u003elock (bsc#1087092).\n- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918).\n- vfb: fix video mode and line_length being set when loaded (bsc#1100362).\n- vfio: Use get_user_pages_longterm correctly (bsc#1095337).\n- vfio: disable filesystem-dax page pinning (bsc#1095337).\n- vfio: platform: Fix reset module leak in error path (bsc#1099918).\n- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13).\n- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10).\n- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13).\n- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10).\n- vhost_net: add missing lock nesting notation (networking-stable-18_04_10).\n- vhost_net: stop device during reset owner (networking-stable-18_02_06).\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).\n- video/hdmi: Allow \u0027empty\u0027 HDMI infoframes (bsc#1051510).\n- video: fbdev/mmp: add MODULE_LICENSE (bsc#1051510).\n- video: fbdev: atmel_lcdfb: fix display-timings lookup (bsc#1051510).\n- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bsc#1051510).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bsc#1051510).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bsc#1051510).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382).\n- virtio: add ability to iterate over vqs (bsc#1051510).\n- virtio: release virtio index when fail to device_register (bsc#1051510).\n- virtio_console: do not tie bufs to a vq (bsc#1051510).\n- virtio_console: drop custom control queue cleanup (bsc#1051510).\n- virtio_console: free buffers after reset (bsc#1051510).\n- virtio_console: move removal code (bsc#1051510).\n- virtio_console: reset on out of memory (bsc#1051510).\n- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26).\n- virtio_net: split out ctrl buffer (networking-stable-18_04_26).\n- virtio_ring: fix num_free handling in error case (bsc#1051510).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (networking-stable-18_04_26).\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (networking-stable-18_04_10).\n- vlan: fix a use-after-free in vlan_device_event() (networking-stable-17_11_20).\n- vmw_balloon: fix inflation with batching (bsc#1051510).\n- vmw_balloon: fixing double free when batching mode is off (bsc#1051510).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860).\n- vmxnet3: increase default rx ring sizes (bsc#1091860).\n- vmxnet3: repair memory leak (bsc#1051510).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860).\n- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bsc#1051510).\n- vt: change SGR 21 to follow the standards (bsc#1051510).\n- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510).\n- vti6: Change minimum MTU to IPV4_MIN_MTU, vti6 can carry IPv4 too (bsc#1082869).\n- vti6: Fix dev-\u003emax_mtu setting (bsc#1082869).\n- vti6: Keep set MTU on link creation or change, validate it (bsc#1082869).\n- vti6: Properly adjust vti6 MTU from MTU of lower device (bsc#1082869).\n- vti6: better validate user provided tunnel names (networking-stable-18_04_10).\n- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bsc#1076830).\n- vxlan: fix the issue that neigh proxy blocks all icmpv6 packets (networking-stable-17_11_20).\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bsc#1051510).\n- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510).\n- wcn36xx: Fix dynamic power saving (bsc#1051510).\n- wcn36xx: Introduce mutual exclusion of fw configuration (bsc#1051510).\n- wl1251: check return from call to wl1251_acx_arp_ip_filter (bsc#1051510).\n- workqueue: Allow retrieval of current task\u0027s work struct (bsc#1051510).\n- workqueue: use put_device() instead of kfree() (bsc#1051510).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158).\n- x86/cpu_entry_area: Map also trace_idt_table (bsc#1089878).\n- x86/intel_rdt: Add command line parameter to control L2_CDP ().\n- x86/intel_rdt: Add two new resources for L2 Code and Data Prioritization (CDP) ().\n- x86/intel_rdt: Enable L2 CDP in MSR IA32_L2_QOS_CFG ().\n- x86/intel_rdt: Enumerate L2 Code and Data Prioritization (CDP) feature ().\n- x86/mm: add a function to check if a pfn is UC/UC-/WC (bsc#1087213).\n- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248).\n- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/setup: Do not reserve a crash kernel region if booted on Xen PV (bsc#1085626).\n- x86/stacktrace: Clarify the reliable success paths (bnc#1058115).\n- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115).\n- x86/stacktrace: Do not unwind after user regs (bnc#1058115).\n- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115).\n- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115).\n- x86/tsc: Future-proof native_calibrate_tsc() (bsc#1074873).\n- x86/unwind/orc: Detect the end of the stack (bnc#1058115).\n- xen/acpi: off by one in read_acpi_id() (bnc#1065600).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen: do not print error message in case of missing Xenstore entry (bnc#1065600).\n- xhci: Add port status decoder for tracing purposes ().\n- xhci: Fix USB ports for Dell Inspiron 5775 (bsc#1090888).\n- xhci: add definitions for all port link states ().\n- xhci: add port speed ID to portsc tracing ().\n- xhci: add port status tracing ().\n- xhci: fix endpoint context tracer output (bsc#1087092).\n- xhci: workaround for AMD Promontory disabled ports wakeup (bsc#1087092).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bsc#1090888).\n- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes).\n- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Basesystem-15-2018-1420,SUSE-SLE-Module-Development-Tools-15-2018-1420,SUSE-SLE-Module-Legacy-15-2018-1420,SUSE-SLE-Module-Live-Patching-15-2018-1420,SUSE-SLE-Product-HA-15-2018-1420,SUSE-SLE-Product-WE-15-2018-1420",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2092-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2092-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2092-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1046306",
"url": "https://bugzilla.suse.com/1046306"
},
{
"category": "self",
"summary": "SUSE Bug 1046307",
"url": "https://bugzilla.suse.com/1046307"
},
{
"category": "self",
"summary": "SUSE Bug 1046540",
"url": "https://bugzilla.suse.com/1046540"
},
{
"category": "self",
"summary": "SUSE Bug 1046542",
"url": "https://bugzilla.suse.com/1046542"
},
{
"category": "self",
"summary": "SUSE Bug 1046543",
"url": "https://bugzilla.suse.com/1046543"
},
{
"category": "self",
"summary": "SUSE Bug 1048129",
"url": "https://bugzilla.suse.com/1048129"
},
{
"category": "self",
"summary": "SUSE Bug 1050242",
"url": "https://bugzilla.suse.com/1050242"
},
{
"category": "self",
"summary": "SUSE Bug 1050252",
"url": "https://bugzilla.suse.com/1050252"
},
{
"category": "self",
"summary": "SUSE Bug 1050529",
"url": "https://bugzilla.suse.com/1050529"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050538",
"url": "https://bugzilla.suse.com/1050538"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1050549",
"url": "https://bugzilla.suse.com/1050549"
},
{
"category": "self",
"summary": "SUSE Bug 1050662",
"url": "https://bugzilla.suse.com/1050662"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1052766",
"url": "https://bugzilla.suse.com/1052766"
},
{
"category": "self",
"summary": "SUSE Bug 1055968",
"url": "https://bugzilla.suse.com/1055968"
},
{
"category": "self",
"summary": "SUSE Bug 1056427",
"url": "https://bugzilla.suse.com/1056427"
},
{
"category": "self",
"summary": "SUSE Bug 1056643",
"url": "https://bugzilla.suse.com/1056643"
},
{
"category": "self",
"summary": "SUSE Bug 1056651",
"url": "https://bugzilla.suse.com/1056651"
},
{
"category": "self",
"summary": "SUSE Bug 1056653",
"url": "https://bugzilla.suse.com/1056653"
},
{
"category": "self",
"summary": "SUSE Bug 1056657",
"url": "https://bugzilla.suse.com/1056657"
},
{
"category": "self",
"summary": "SUSE Bug 1056658",
"url": "https://bugzilla.suse.com/1056658"
},
{
"category": "self",
"summary": "SUSE Bug 1056662",
"url": "https://bugzilla.suse.com/1056662"
},
{
"category": "self",
"summary": "SUSE Bug 1056686",
"url": "https://bugzilla.suse.com/1056686"
},
{
"category": "self",
"summary": "SUSE Bug 1056787",
"url": "https://bugzilla.suse.com/1056787"
},
{
"category": "self",
"summary": "SUSE Bug 1058115",
"url": "https://bugzilla.suse.com/1058115"
},
{
"category": "self",
"summary": "SUSE Bug 1058513",
"url": "https://bugzilla.suse.com/1058513"
},
{
"category": "self",
"summary": "SUSE Bug 1058659",
"url": "https://bugzilla.suse.com/1058659"
},
{
"category": "self",
"summary": "SUSE Bug 1058717",
"url": "https://bugzilla.suse.com/1058717"
},
{
"category": "self",
"summary": "SUSE Bug 1060463",
"url": "https://bugzilla.suse.com/1060463"
},
{
"category": "self",
"summary": "SUSE Bug 1061024",
"url": "https://bugzilla.suse.com/1061024"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1062897",
"url": "https://bugzilla.suse.com/1062897"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066110",
"url": "https://bugzilla.suse.com/1066110"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1068054",
"url": "https://bugzilla.suse.com/1068054"
},
{
"category": "self",
"summary": "SUSE Bug 1071218",
"url": "https://bugzilla.suse.com/1071218"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1072829",
"url": "https://bugzilla.suse.com/1072829"
},
{
"category": "self",
"summary": "SUSE Bug 1072856",
"url": "https://bugzilla.suse.com/1072856"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1073765",
"url": "https://bugzilla.suse.com/1073765"
},
{
"category": "self",
"summary": "SUSE Bug 1073960",
"url": "https://bugzilla.suse.com/1073960"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1074578",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "self",
"summary": "SUSE Bug 1074701",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "self",
"summary": "SUSE Bug 1074741",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "self",
"summary": "SUSE Bug 1074873",
"url": "https://bugzilla.suse.com/1074873"
},
{
"category": "self",
"summary": "SUSE Bug 1074919",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "self",
"summary": "SUSE Bug 1075006",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "self",
"summary": "SUSE Bug 1075007",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "self",
"summary": "SUSE Bug 1075262",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "self",
"summary": "SUSE Bug 1075419",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "self",
"summary": "SUSE Bug 1075748",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "self",
"summary": "SUSE Bug 1075876",
"url": "https://bugzilla.suse.com/1075876"
},
{
"category": "self",
"summary": "SUSE Bug 1076049",
"url": "https://bugzilla.suse.com/1076049"
},
{
"category": "self",
"summary": "SUSE Bug 1076115",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "self",
"summary": "SUSE Bug 1076372",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "self",
"summary": "SUSE Bug 1076830",
"url": "https://bugzilla.suse.com/1076830"
},
{
"category": "self",
"summary": "SUSE Bug 1077338",
"url": "https://bugzilla.suse.com/1077338"
},
{
"category": "self",
"summary": "SUSE Bug 1078248",
"url": "https://bugzilla.suse.com/1078248"
},
{
"category": "self",
"summary": "SUSE Bug 1078353",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "self",
"summary": "SUSE Bug 1079152",
"url": "https://bugzilla.suse.com/1079152"
},
{
"category": "self",
"summary": "SUSE Bug 1079747",
"url": "https://bugzilla.suse.com/1079747"
},
{
"category": "self",
"summary": "SUSE Bug 1080039",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "self",
"summary": "SUSE Bug 1080542",
"url": "https://bugzilla.suse.com/1080542"
},
{
"category": "self",
"summary": "SUSE Bug 1081599",
"url": "https://bugzilla.suse.com/1081599"
},
{
"category": "self",
"summary": "SUSE Bug 1082485",
"url": "https://bugzilla.suse.com/1082485"
},
{
"category": "self",
"summary": "SUSE Bug 1082504",
"url": "https://bugzilla.suse.com/1082504"
},
{
"category": "self",
"summary": "SUSE Bug 1082869",
"url": "https://bugzilla.suse.com/1082869"
},
{
"category": "self",
"summary": "SUSE Bug 1082962",
"url": "https://bugzilla.suse.com/1082962"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1083900",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "self",
"summary": "SUSE Bug 1084001",
"url": "https://bugzilla.suse.com/1084001"
},
{
"category": "self",
"summary": "SUSE Bug 1084570",
"url": "https://bugzilla.suse.com/1084570"
},
{
"category": "self",
"summary": "SUSE Bug 1085308",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "self",
"summary": "SUSE Bug 1085539",
"url": "https://bugzilla.suse.com/1085539"
},
{
"category": "self",
"summary": "SUSE Bug 1085626",
"url": "https://bugzilla.suse.com/1085626"
},
{
"category": "self",
"summary": "SUSE Bug 1085933",
"url": "https://bugzilla.suse.com/1085933"
},
{
"category": "self",
"summary": "SUSE Bug 1085936",
"url": "https://bugzilla.suse.com/1085936"
},
{
"category": "self",
"summary": "SUSE Bug 1085937",
"url": "https://bugzilla.suse.com/1085937"
},
{
"category": "self",
"summary": "SUSE Bug 1085938",
"url": "https://bugzilla.suse.com/1085938"
},
{
"category": "self",
"summary": "SUSE Bug 1085939",
"url": "https://bugzilla.suse.com/1085939"
},
{
"category": "self",
"summary": "SUSE Bug 1085941",
"url": "https://bugzilla.suse.com/1085941"
},
{
"category": "self",
"summary": "SUSE Bug 1086282",
"url": "https://bugzilla.suse.com/1086282"
},
{
"category": "self",
"summary": "SUSE Bug 1086283",
"url": "https://bugzilla.suse.com/1086283"
},
{
"category": "self",
"summary": "SUSE Bug 1086286",
"url": "https://bugzilla.suse.com/1086286"
},
{
"category": "self",
"summary": "SUSE Bug 1086288",
"url": "https://bugzilla.suse.com/1086288"
},
{
"category": "self",
"summary": "SUSE Bug 1086319",
"url": "https://bugzilla.suse.com/1086319"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1086400",
"url": "https://bugzilla.suse.com/1086400"
},
{
"category": "self",
"summary": "SUSE Bug 1086652",
"url": "https://bugzilla.suse.com/1086652"
},
{
"category": "self",
"summary": "SUSE Bug 1086739",
"url": "https://bugzilla.suse.com/1086739"
},
{
"category": "self",
"summary": "SUSE Bug 1087078",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087084",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1087205",
"url": "https://bugzilla.suse.com/1087205"
},
{
"category": "self",
"summary": "SUSE Bug 1087210",
"url": "https://bugzilla.suse.com/1087210"
},
{
"category": "self",
"summary": "SUSE Bug 1087213",
"url": "https://bugzilla.suse.com/1087213"
},
{
"category": "self",
"summary": "SUSE Bug 1087214",
"url": "https://bugzilla.suse.com/1087214"
},
{
"category": "self",
"summary": "SUSE Bug 1087284",
"url": "https://bugzilla.suse.com/1087284"
},
{
"category": "self",
"summary": "SUSE Bug 1087405",
"url": "https://bugzilla.suse.com/1087405"
},
{
"category": "self",
"summary": "SUSE Bug 1087458",
"url": "https://bugzilla.suse.com/1087458"
},
{
"category": "self",
"summary": "SUSE Bug 1087939",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "self",
"summary": "SUSE Bug 1087978",
"url": "https://bugzilla.suse.com/1087978"
},
{
"category": "self",
"summary": "SUSE Bug 1088354",
"url": "https://bugzilla.suse.com/1088354"
},
{
"category": "self",
"summary": "SUSE Bug 1088690",
"url": "https://bugzilla.suse.com/1088690"
},
{
"category": "self",
"summary": "SUSE Bug 1088704",
"url": "https://bugzilla.suse.com/1088704"
},
{
"category": "self",
"summary": "SUSE Bug 1088722",
"url": "https://bugzilla.suse.com/1088722"
},
{
"category": "self",
"summary": "SUSE Bug 1088796",
"url": "https://bugzilla.suse.com/1088796"
},
{
"category": "self",
"summary": "SUSE Bug 1088804",
"url": "https://bugzilla.suse.com/1088804"
},
{
"category": "self",
"summary": "SUSE Bug 1088821",
"url": "https://bugzilla.suse.com/1088821"
},
{
"category": "self",
"summary": "SUSE Bug 1088866",
"url": "https://bugzilla.suse.com/1088866"
},
{
"category": "self",
"summary": "SUSE Bug 1089115",
"url": "https://bugzilla.suse.com/1089115"
},
{
"category": "self",
"summary": "SUSE Bug 1089268",
"url": "https://bugzilla.suse.com/1089268"
},
{
"category": "self",
"summary": "SUSE Bug 1089467",
"url": "https://bugzilla.suse.com/1089467"
},
{
"category": "self",
"summary": "SUSE Bug 1089608",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "self",
"summary": "SUSE Bug 1089663",
"url": "https://bugzilla.suse.com/1089663"
},
{
"category": "self",
"summary": "SUSE Bug 1089664",
"url": "https://bugzilla.suse.com/1089664"
},
{
"category": "self",
"summary": "SUSE Bug 1089667",
"url": "https://bugzilla.suse.com/1089667"
},
{
"category": "self",
"summary": "SUSE Bug 1089669",
"url": "https://bugzilla.suse.com/1089669"
},
{
"category": "self",
"summary": "SUSE Bug 1089752",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "self",
"summary": "SUSE Bug 1089753",
"url": "https://bugzilla.suse.com/1089753"
},
{
"category": "self",
"summary": "SUSE Bug 1089878",
"url": "https://bugzilla.suse.com/1089878"
},
{
"category": "self",
"summary": "SUSE Bug 1090150",
"url": "https://bugzilla.suse.com/1090150"
},
{
"category": "self",
"summary": "SUSE Bug 1090457",
"url": "https://bugzilla.suse.com/1090457"
},
{
"category": "self",
"summary": "SUSE Bug 1090605",
"url": "https://bugzilla.suse.com/1090605"
},
{
"category": "self",
"summary": "SUSE Bug 1090643",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "self",
"summary": "SUSE Bug 1090646",
"url": "https://bugzilla.suse.com/1090646"
},
{
"category": "self",
"summary": "SUSE Bug 1090658",
"url": "https://bugzilla.suse.com/1090658"
},
{
"category": "self",
"summary": "SUSE Bug 1090734",
"url": "https://bugzilla.suse.com/1090734"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1090953",
"url": "https://bugzilla.suse.com/1090953"
},
{
"category": "self",
"summary": "SUSE Bug 1091158",
"url": "https://bugzilla.suse.com/1091158"
},
{
"category": "self",
"summary": "SUSE Bug 1091171",
"url": "https://bugzilla.suse.com/1091171"
},
{
"category": "self",
"summary": "SUSE Bug 1091424",
"url": "https://bugzilla.suse.com/1091424"
},
{
"category": "self",
"summary": "SUSE Bug 1091594",
"url": "https://bugzilla.suse.com/1091594"
},
{
"category": "self",
"summary": "SUSE Bug 1091666",
"url": "https://bugzilla.suse.com/1091666"
},
{
"category": "self",
"summary": "SUSE Bug 1091678",
"url": "https://bugzilla.suse.com/1091678"
},
{
"category": "self",
"summary": "SUSE Bug 1091686",
"url": "https://bugzilla.suse.com/1091686"
},
{
"category": "self",
"summary": "SUSE Bug 1091781",
"url": "https://bugzilla.suse.com/1091781"
},
{
"category": "self",
"summary": "SUSE Bug 1091782",
"url": "https://bugzilla.suse.com/1091782"
},
{
"category": "self",
"summary": "SUSE Bug 1091815",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "self",
"summary": "SUSE Bug 1091860",
"url": "https://bugzilla.suse.com/1091860"
},
{
"category": "self",
"summary": "SUSE Bug 1091960",
"url": "https://bugzilla.suse.com/1091960"
},
{
"category": "self",
"summary": "SUSE Bug 1092100",
"url": "https://bugzilla.suse.com/1092100"
},
{
"category": "self",
"summary": "SUSE Bug 1092472",
"url": "https://bugzilla.suse.com/1092472"
},
{
"category": "self",
"summary": "SUSE Bug 1092710",
"url": "https://bugzilla.suse.com/1092710"
},
{
"category": "self",
"summary": "SUSE Bug 1092772",
"url": "https://bugzilla.suse.com/1092772"
},
{
"category": "self",
"summary": "SUSE Bug 1092888",
"url": "https://bugzilla.suse.com/1092888"
},
{
"category": "self",
"summary": "SUSE Bug 1092904",
"url": "https://bugzilla.suse.com/1092904"
},
{
"category": "self",
"summary": "SUSE Bug 1092975",
"url": "https://bugzilla.suse.com/1092975"
},
{
"category": "self",
"summary": "SUSE Bug 1093023",
"url": "https://bugzilla.suse.com/1093023"
},
{
"category": "self",
"summary": "SUSE Bug 1093027",
"url": "https://bugzilla.suse.com/1093027"
},
{
"category": "self",
"summary": "SUSE Bug 1093035",
"url": "https://bugzilla.suse.com/1093035"
},
{
"category": "self",
"summary": "SUSE Bug 1093118",
"url": "https://bugzilla.suse.com/1093118"
},
{
"category": "self",
"summary": "SUSE Bug 1093148",
"url": "https://bugzilla.suse.com/1093148"
},
{
"category": "self",
"summary": "SUSE Bug 1093158",
"url": "https://bugzilla.suse.com/1093158"
},
{
"category": "self",
"summary": "SUSE Bug 1093184",
"url": "https://bugzilla.suse.com/1093184"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1093273",
"url": "https://bugzilla.suse.com/1093273"
},
{
"category": "self",
"summary": "SUSE Bug 1093290",
"url": "https://bugzilla.suse.com/1093290"
},
{
"category": "self",
"summary": "SUSE Bug 1093604",
"url": "https://bugzilla.suse.com/1093604"
},
{
"category": "self",
"summary": "SUSE Bug 1093641",
"url": "https://bugzilla.suse.com/1093641"
},
{
"category": "self",
"summary": "SUSE Bug 1093649",
"url": "https://bugzilla.suse.com/1093649"
},
{
"category": "self",
"summary": "SUSE Bug 1093653",
"url": "https://bugzilla.suse.com/1093653"
},
{
"category": "self",
"summary": "SUSE Bug 1093655",
"url": "https://bugzilla.suse.com/1093655"
},
{
"category": "self",
"summary": "SUSE Bug 1093657",
"url": "https://bugzilla.suse.com/1093657"
},
{
"category": "self",
"summary": "SUSE Bug 1093663",
"url": "https://bugzilla.suse.com/1093663"
},
{
"category": "self",
"summary": "SUSE Bug 1093721",
"url": "https://bugzilla.suse.com/1093721"
},
{
"category": "self",
"summary": "SUSE Bug 1093728",
"url": "https://bugzilla.suse.com/1093728"
},
{
"category": "self",
"summary": "SUSE Bug 1093904",
"url": "https://bugzilla.suse.com/1093904"
},
{
"category": "self",
"summary": "SUSE Bug 1093990",
"url": "https://bugzilla.suse.com/1093990"
},
{
"category": "self",
"summary": "SUSE Bug 1094244",
"url": "https://bugzilla.suse.com/1094244"
},
{
"category": "self",
"summary": "SUSE Bug 1094356",
"url": "https://bugzilla.suse.com/1094356"
},
{
"category": "self",
"summary": "SUSE Bug 1094420",
"url": "https://bugzilla.suse.com/1094420"
},
{
"category": "self",
"summary": "SUSE Bug 1094541",
"url": "https://bugzilla.suse.com/1094541"
},
{
"category": "self",
"summary": "SUSE Bug 1094575",
"url": "https://bugzilla.suse.com/1094575"
},
{
"category": "self",
"summary": "SUSE Bug 1094751",
"url": "https://bugzilla.suse.com/1094751"
},
{
"category": "self",
"summary": "SUSE Bug 1094825",
"url": "https://bugzilla.suse.com/1094825"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1094912",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "self",
"summary": "SUSE Bug 1094978",
"url": "https://bugzilla.suse.com/1094978"
},
{
"category": "self",
"summary": "SUSE Bug 1095042",
"url": "https://bugzilla.suse.com/1095042"
},
{
"category": "self",
"summary": "SUSE Bug 1095094",
"url": "https://bugzilla.suse.com/1095094"
},
{
"category": "self",
"summary": "SUSE Bug 1095115",
"url": "https://bugzilla.suse.com/1095115"
},
{
"category": "self",
"summary": "SUSE Bug 1095155",
"url": "https://bugzilla.suse.com/1095155"
},
{
"category": "self",
"summary": "SUSE Bug 1095265",
"url": "https://bugzilla.suse.com/1095265"
},
{
"category": "self",
"summary": "SUSE Bug 1095321",
"url": "https://bugzilla.suse.com/1095321"
},
{
"category": "self",
"summary": "SUSE Bug 1095337",
"url": "https://bugzilla.suse.com/1095337"
},
{
"category": "self",
"summary": "SUSE Bug 1095467",
"url": "https://bugzilla.suse.com/1095467"
},
{
"category": "self",
"summary": "SUSE Bug 1095573",
"url": "https://bugzilla.suse.com/1095573"
},
{
"category": "self",
"summary": "SUSE Bug 1095735",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "self",
"summary": "SUSE Bug 1095893",
"url": "https://bugzilla.suse.com/1095893"
},
{
"category": "self",
"summary": "SUSE Bug 1096065",
"url": "https://bugzilla.suse.com/1096065"
},
{
"category": "self",
"summary": "SUSE Bug 1096480",
"url": "https://bugzilla.suse.com/1096480"
},
{
"category": "self",
"summary": "SUSE Bug 1096529",
"url": "https://bugzilla.suse.com/1096529"
},
{
"category": "self",
"summary": "SUSE Bug 1096696",
"url": "https://bugzilla.suse.com/1096696"
},
{
"category": "self",
"summary": "SUSE Bug 1096705",
"url": "https://bugzilla.suse.com/1096705"
},
{
"category": "self",
"summary": "SUSE Bug 1096728",
"url": "https://bugzilla.suse.com/1096728"
},
{
"category": "self",
"summary": "SUSE Bug 1096753",
"url": "https://bugzilla.suse.com/1096753"
},
{
"category": "self",
"summary": "SUSE Bug 1096790",
"url": "https://bugzilla.suse.com/1096790"
},
{
"category": "self",
"summary": "SUSE Bug 1096793",
"url": "https://bugzilla.suse.com/1096793"
},
{
"category": "self",
"summary": "SUSE Bug 1097034",
"url": "https://bugzilla.suse.com/1097034"
},
{
"category": "self",
"summary": "SUSE Bug 1097105",
"url": "https://bugzilla.suse.com/1097105"
},
{
"category": "self",
"summary": "SUSE Bug 1097234",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "self",
"summary": "SUSE Bug 1097356",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "self",
"summary": "SUSE Bug 1097373",
"url": "https://bugzilla.suse.com/1097373"
},
{
"category": "self",
"summary": "SUSE Bug 1097439",
"url": "https://bugzilla.suse.com/1097439"
},
{
"category": "self",
"summary": "SUSE Bug 1097465",
"url": "https://bugzilla.suse.com/1097465"
},
{
"category": "self",
"summary": "SUSE Bug 1097468",
"url": "https://bugzilla.suse.com/1097468"
},
{
"category": "self",
"summary": "SUSE Bug 1097470",
"url": "https://bugzilla.suse.com/1097470"
},
{
"category": "self",
"summary": "SUSE Bug 1097471",
"url": "https://bugzilla.suse.com/1097471"
},
{
"category": "self",
"summary": "SUSE Bug 1097472",
"url": "https://bugzilla.suse.com/1097472"
},
{
"category": "self",
"summary": "SUSE Bug 1097551",
"url": "https://bugzilla.suse.com/1097551"
},
{
"category": "self",
"summary": "SUSE Bug 1097780",
"url": "https://bugzilla.suse.com/1097780"
},
{
"category": "self",
"summary": "SUSE Bug 1097796",
"url": "https://bugzilla.suse.com/1097796"
},
{
"category": "self",
"summary": "SUSE Bug 1097800",
"url": "https://bugzilla.suse.com/1097800"
},
{
"category": "self",
"summary": "SUSE Bug 1097941",
"url": "https://bugzilla.suse.com/1097941"
},
{
"category": "self",
"summary": "SUSE Bug 1097961",
"url": "https://bugzilla.suse.com/1097961"
},
{
"category": "self",
"summary": "SUSE Bug 1098016",
"url": "https://bugzilla.suse.com/1098016"
},
{
"category": "self",
"summary": "SUSE Bug 1098043",
"url": "https://bugzilla.suse.com/1098043"
},
{
"category": "self",
"summary": "SUSE Bug 1098050",
"url": "https://bugzilla.suse.com/1098050"
},
{
"category": "self",
"summary": "SUSE Bug 1098174",
"url": "https://bugzilla.suse.com/1098174"
},
{
"category": "self",
"summary": "SUSE Bug 1098176",
"url": "https://bugzilla.suse.com/1098176"
},
{
"category": "self",
"summary": "SUSE Bug 1098236",
"url": "https://bugzilla.suse.com/1098236"
},
{
"category": "self",
"summary": "SUSE Bug 1098401",
"url": "https://bugzilla.suse.com/1098401"
},
{
"category": "self",
"summary": "SUSE Bug 1098425",
"url": "https://bugzilla.suse.com/1098425"
},
{
"category": "self",
"summary": "SUSE Bug 1098435",
"url": "https://bugzilla.suse.com/1098435"
},
{
"category": "self",
"summary": "SUSE Bug 1098599",
"url": "https://bugzilla.suse.com/1098599"
},
{
"category": "self",
"summary": "SUSE Bug 1098626",
"url": "https://bugzilla.suse.com/1098626"
},
{
"category": "self",
"summary": "SUSE Bug 1098706",
"url": "https://bugzilla.suse.com/1098706"
},
{
"category": "self",
"summary": "SUSE Bug 1098983",
"url": "https://bugzilla.suse.com/1098983"
},
{
"category": "self",
"summary": "SUSE Bug 1098995",
"url": "https://bugzilla.suse.com/1098995"
},
{
"category": "self",
"summary": "SUSE Bug 1099029",
"url": "https://bugzilla.suse.com/1099029"
},
{
"category": "self",
"summary": "SUSE Bug 1099041",
"url": "https://bugzilla.suse.com/1099041"
},
{
"category": "self",
"summary": "SUSE Bug 1099109",
"url": "https://bugzilla.suse.com/1099109"
},
{
"category": "self",
"summary": "SUSE Bug 1099142",
"url": "https://bugzilla.suse.com/1099142"
},
{
"category": "self",
"summary": "SUSE Bug 1099183",
"url": "https://bugzilla.suse.com/1099183"
},
{
"category": "self",
"summary": "SUSE Bug 1099715",
"url": "https://bugzilla.suse.com/1099715"
},
{
"category": "self",
"summary": "SUSE Bug 1099792",
"url": "https://bugzilla.suse.com/1099792"
},
{
"category": "self",
"summary": "SUSE Bug 1099918",
"url": "https://bugzilla.suse.com/1099918"
},
{
"category": "self",
"summary": "SUSE Bug 1099924",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "self",
"summary": "SUSE Bug 1099966",
"url": "https://bugzilla.suse.com/1099966"
},
{
"category": "self",
"summary": "SUSE Bug 1100132",
"url": "https://bugzilla.suse.com/1100132"
},
{
"category": "self",
"summary": "SUSE Bug 1100209",
"url": "https://bugzilla.suse.com/1100209"
},
{
"category": "self",
"summary": "SUSE Bug 1100340",
"url": "https://bugzilla.suse.com/1100340"
},
{
"category": "self",
"summary": "SUSE Bug 1100362",
"url": "https://bugzilla.suse.com/1100362"
},
{
"category": "self",
"summary": "SUSE Bug 1100382",
"url": "https://bugzilla.suse.com/1100382"
},
{
"category": "self",
"summary": "SUSE Bug 1100394",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1100418",
"url": "https://bugzilla.suse.com/1100418"
},
{
"category": "self",
"summary": "SUSE Bug 1100491",
"url": "https://bugzilla.suse.com/1100491"
},
{
"category": "self",
"summary": "SUSE Bug 1100602",
"url": "https://bugzilla.suse.com/1100602"
},
{
"category": "self",
"summary": "SUSE Bug 1100633",
"url": "https://bugzilla.suse.com/1100633"
},
{
"category": "self",
"summary": "SUSE Bug 1100843",
"url": "https://bugzilla.suse.com/1100843"
},
{
"category": "self",
"summary": "SUSE Bug 1101296",
"url": "https://bugzilla.suse.com/1101296"
},
{
"category": "self",
"summary": "SUSE Bug 1101315",
"url": "https://bugzilla.suse.com/1101315"
},
{
"category": "self",
"summary": "SUSE Bug 1101324",
"url": "https://bugzilla.suse.com/1101324"
},
{
"category": "self",
"summary": "SUSE Bug 971975",
"url": "https://bugzilla.suse.com/971975"
},
{
"category": "self",
"summary": "SUSE Bug 975772",
"url": "https://bugzilla.suse.com/975772"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000200 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000204 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10087 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10087/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1092 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1093 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1094 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1118 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1120 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12233 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13053 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13406 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5803 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-5848 page",
"url": "https://www.suse.com/security/cve/CVE-2018-5848/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7492 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7492/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8781 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-9385 page",
"url": "https://www.suse.com/security/cve/CVE-2018-9385/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2018-07-27T13:37:02Z",
"generator": {
"date": "2018-07-27T13:37:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2092-1",
"initial_release_date": "2018-07-27T13:37:02Z",
"revision_history": [
{
"date": "2018-07-27T13:37:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-25.3.1.aarch64",
"product_id": "kernel-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.aarch64",
"product_id": "kernel-syms-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-25.3.1.noarch",
"product_id": "kernel-devel-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-25.3.1.noarch",
"product_id": "kernel-macros-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-25.3.1.noarch",
"product_id": "kernel-docs-4.12.14-25.3.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-25.3.1.noarch",
"product": {
"name": "kernel-source-4.12.14-25.3.1.noarch",
"product_id": "kernel-source-4.12.14-25.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-syms-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-devel-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-25.3.1.s390x",
"product_id": "kernel-default-man-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.s390x",
"product_id": "kernel-obs-build-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.s390x",
"product_id": "kernel-syms-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-25.3.1.x86_64",
"product_id": "kernel-syms-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-25.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch"
},
"product_reference": "kernel-source-4.12.14-25.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-25.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-1000200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000200"
}
],
"notes": [
{
"category": "general",
"text": "The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process\u0027s final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper\u0027s unmap_page_range() since the vma\u0027s VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000200",
"url": "https://www.suse.com/security/cve/CVE-2018-1000200"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1000200",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090150 for CVE-2018-1000200",
"url": "https://bugzilla.suse.com/1090150"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000200"
},
{
"cve": "CVE-2018-1000204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000204"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000204",
"url": "https://www.suse.com/security/cve/CVE-2018-1000204"
},
{
"category": "external",
"summary": "SUSE Bug 1096728 for CVE-2018-1000204",
"url": "https://bugzilla.suse.com/1096728"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-1000204",
"url": "https://bugzilla.suse.com/1105412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1000204"
},
{
"cve": "CVE-2018-10087",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10087"
}
],
"notes": [
{
"category": "general",
"text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10087",
"url": "https://www.suse.com/security/cve/CVE-2018-10087"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089608 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1089608"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10087",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-10087"
},
{
"cve": "CVE-2018-10124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10124"
}
],
"notes": [
{
"category": "general",
"text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10124",
"url": "https://www.suse.com/security/cve/CVE-2018-10124"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1089752 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1089752"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2018-10124",
"url": "https://bugzilla.suse.com/1091815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-10124"
},
{
"cve": "CVE-2018-1092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1092"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1092",
"url": "https://www.suse.com/security/cve/CVE-2018-1092"
},
{
"category": "external",
"summary": "SUSE Bug 1087012 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087012"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1092",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1092"
},
{
"cve": "CVE-2018-1093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1093"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1093",
"url": "https://www.suse.com/security/cve/CVE-2018-1093"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1087095 for CVE-2018-1093",
"url": "https://bugzilla.suse.com/1087095"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-1093"
},
{
"cve": "CVE-2018-1094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1094"
}
],
"notes": [
{
"category": "general",
"text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1094",
"url": "https://www.suse.com/security/cve/CVE-2018-1094"
},
{
"category": "external",
"summary": "SUSE Bug 1087007 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087007"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1094",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-1094"
},
{
"cve": "CVE-2018-1118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1118"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1118",
"url": "https://www.suse.com/security/cve/CVE-2018-1118"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092472 for CVE-2018-1118",
"url": "https://bugzilla.suse.com/1092472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-1118"
},
{
"cve": "CVE-2018-1120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1120"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1120",
"url": "https://www.suse.com/security/cve/CVE-2018-1120"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092100 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1092100"
},
{
"category": "external",
"summary": "SUSE Bug 1093158 for CVE-2018-1120",
"url": "https://bugzilla.suse.com/1093158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-1120"
},
{
"cve": "CVE-2018-1130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1130"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1130",
"url": "https://www.suse.com/security/cve/CVE-2018-1130"
},
{
"category": "external",
"summary": "SUSE Bug 1092904 for CVE-2018-1130",
"url": "https://bugzilla.suse.com/1092904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-1130"
},
{
"cve": "CVE-2018-12233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12233"
}
],
"notes": [
{
"category": "general",
"text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12233",
"url": "https://www.suse.com/security/cve/CVE-2018-12233"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097234 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1097234"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-12233",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-12233"
},
{
"cve": "CVE-2018-13053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13053"
}
],
"notes": [
{
"category": "general",
"text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13053",
"url": "https://www.suse.com/security/cve/CVE-2018-13053"
},
{
"category": "external",
"summary": "SUSE Bug 1099924 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1099924"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13053",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-13053"
},
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-13406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13406"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13406",
"url": "https://www.suse.com/security/cve/CVE-2018-13406"
},
{
"category": "external",
"summary": "SUSE Bug 1098016 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1098016"
},
{
"category": "external",
"summary": "SUSE Bug 1100418 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1100418"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-13406",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-13406"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-5803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5803"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5803",
"url": "https://www.suse.com/security/cve/CVE-2018-5803"
},
{
"category": "external",
"summary": "SUSE Bug 1083900 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1083900"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-5803",
"url": "https://bugzilla.suse.com/1115893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "low"
}
],
"title": "CVE-2018-5803"
},
{
"cve": "CVE-2018-5848",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-5848"
}
],
"notes": [
{
"category": "general",
"text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-5848",
"url": "https://www.suse.com/security/cve/CVE-2018-5848"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1097356 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1097356"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1115339 for CVE-2018-5848",
"url": "https://bugzilla.suse.com/1115339"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-5848"
},
{
"cve": "CVE-2018-7492",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7492"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7492",
"url": "https://www.suse.com/security/cve/CVE-2018-7492"
},
{
"category": "external",
"summary": "SUSE Bug 1082962 for CVE-2018-7492",
"url": "https://bugzilla.suse.com/1082962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-7492"
},
{
"cve": "CVE-2018-8781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8781"
}
],
"notes": [
{
"category": "general",
"text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8781",
"url": "https://www.suse.com/security/cve/CVE-2018-8781"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1090643 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090643"
},
{
"category": "external",
"summary": "SUSE Bug 1090646 for CVE-2018-8781",
"url": "https://bugzilla.suse.com/1090646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-8781"
},
{
"cve": "CVE-2018-9385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-9385"
}
],
"notes": [
{
"category": "general",
"text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-9385",
"url": "https://www.suse.com/security/cve/CVE-2018-9385"
},
{
"category": "external",
"summary": "SUSE Bug 1100491 for CVE-2018-9385",
"url": "https://bugzilla.suse.com/1100491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-27T13:37:02Z",
"details": "moderate"
}
],
"title": "CVE-2018-9385"
}
]
}
SUSE-SU-2023:3333-1
Vulnerability from csaf_suse - Published: 2023-08-16 10:45 - Updated: 2023-08-16 10:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).\n- CVE-2023-3776: Fixed improper refcount update in cls_fw leads to use-after-free (bsc#1213588).\n- CVE-2022-40982: Fixed transient execution attack called \u0027Gather Data Sampling\u0027 (bsc#1206418).\n- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).\n- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).\n- CVE-2023-20593: Fixed a ZenBleed issue in \u0027Zen 2\u0027 CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).\n- CVE-2018-3639: Fixed Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1087082).\n- CVE-2017-18344: Fixed an OOB access led by an invalid check in timer_create. (bsc#1102851).\n- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).\n- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).\n- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).\n- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).\n- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).\n\nThe following non-security bugs were fixed:\n\n- fbcon: Check font dimension limits (CVE-2023-3161 bsc#1212154).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (CVE-2023-3159 bsc#1212128).\n- kABI: restore _copy_from_user on x86_64 and copy_to_user on x86 (bsc#1211738 CVE-2023-0459).\n- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (bsc#1212501 CVE-2023-35824).\n- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).\n- memstick: r592: Fix UAF bug in r592_remove due to race condition (CVE-2023-3141 bsc#1212129 bsc#1211449).\n- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).\n- pkt_sched: fix error return code in fw_change_attrs() (bsc#1213588).\n- pkt_sched: fix error return code in fw_change_attrs() (bsc#1213588).\n- posix-timer: Properly check sigevent-\u003esigev_notify (CVE-2017-18344, bsc#1102851, bsc#1208715).\n- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).\n- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).\n- vc_screen: don\u0027t clobber return value in vcs_read (bsc#1213167 CVE-2023-3567).\n- vc_screen: modify vcs_size() handling in vcs_read() (bsc#1213167 CVE-2023-3567).\n- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (bsc#1213167 CVE-2023-3567).\n- x86: Unify copy_from_user() size checking (bsc#1211738 CVE-2023-0459).\n- x86/copy_user: Unify the code by removing the 64-bit asm _copy_*_user() variants (bsc#1211738 CVE-2023-0459).\n- x86/cpu/amd: Add a Zenbleed fix (bsc#1213286, CVE-2023-20593).\n- x86/speculation: Add Gather Data Sampling mitigation (bsc#1206418, CVE-2022-40982).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-3333,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2023-3333",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_3333-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:3333-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20233333-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:3333-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1102851",
"url": "https://bugzilla.suse.com/1102851"
},
{
"category": "self",
"summary": "SUSE Bug 1205803",
"url": "https://bugzilla.suse.com/1205803"
},
{
"category": "self",
"summary": "SUSE Bug 1206418",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "self",
"summary": "SUSE Bug 1211738",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "self",
"summary": "SUSE Bug 1212128",
"url": "https://bugzilla.suse.com/1212128"
},
{
"category": "self",
"summary": "SUSE Bug 1212129",
"url": "https://bugzilla.suse.com/1212129"
},
{
"category": "self",
"summary": "SUSE Bug 1212154",
"url": "https://bugzilla.suse.com/1212154"
},
{
"category": "self",
"summary": "SUSE Bug 1212501",
"url": "https://bugzilla.suse.com/1212501"
},
{
"category": "self",
"summary": "SUSE Bug 1212502",
"url": "https://bugzilla.suse.com/1212502"
},
{
"category": "self",
"summary": "SUSE Bug 1213167",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "self",
"summary": "SUSE Bug 1213286",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "self",
"summary": "SUSE Bug 1213588",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18344 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-40982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-40982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-45919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-45919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-0459 page",
"url": "https://www.suse.com/security/cve/CVE-2023-0459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-20593 page",
"url": "https://www.suse.com/security/cve/CVE-2023-20593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3141 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3159 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3161 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3268 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3567 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-35824 page",
"url": "https://www.suse.com/security/cve/CVE-2023-35824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3776 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3776/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2023-08-16T10:45:46Z",
"generator": {
"date": "2023-08-16T10:45:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:3333-1",
"initial_release_date": "2023-08-16T10:45:46Z",
"revision_history": [
{
"date": "2023-08-16T10:45:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-debug-3.0.101-108.144.1.i586",
"product_id": "kernel-debug-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-debug-base-3.0.101-108.144.1.i586",
"product_id": "kernel-debug-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-debug-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-debug-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-debug-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-debug-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-debug-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.144.1.i586",
"product_id": "kernel-default-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.144.1.i586",
"product_id": "kernel-default-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-default-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-default-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-default-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-default-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.144.1.i586",
"product_id": "kernel-ec2-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.144.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-ec2-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-ec2-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.144.1.i586",
"product_id": "kernel-pae-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.144.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-pae-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-pae-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-pae-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-pae-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.144.1.i586",
"product_id": "kernel-source-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.i586",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.144.1.i586",
"product_id": "kernel-syms-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.144.1.i586",
"product_id": "kernel-trace-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.144.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-trace-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-trace-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-trace-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-vanilla-3.0.101-108.144.1.i586",
"product_id": "kernel-vanilla-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.144.1.i586",
"product_id": "kernel-vanilla-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-vanilla-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-vanilla-hmac-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.144.1.i586",
"product_id": "kernel-xen-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.144.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.144.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-xen-extra-3.0.101-108.144.1.i586",
"product_id": "kernel-xen-extra-3.0.101-108.144.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.144.1.i586",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.144.1.i586",
"product_id": "kernel-xen-hmac-3.0.101-108.144.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.144.1.ia64",
"product_id": "kernel-source-3.0.101-108.144.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.ia64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.ia64",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.144.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.144.1.noarch",
"product_id": "kernel-docs-3.0.101-108.144.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.ppc",
"product": {
"name": "kernel-source-3.0.101-108.144.1.ppc",
"product_id": "kernel-source-3.0.101-108.144.1.ppc"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.ppc",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.ppc",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.ppc"
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.144.1.ppc64",
"product_id": "kernel-source-3.0.101-108.144.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.ppc64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.ppc64",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.s390",
"product": {
"name": "kernel-source-3.0.101-108.144.1.s390",
"product_id": "kernel-source-3.0.101-108.144.1.s390"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.s390",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.s390",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.144.1.s390x",
"product_id": "kernel-source-3.0.101-108.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.s390x",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.s390x",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-debug-3.0.101-108.144.1.x86_64",
"product_id": "kernel-debug-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-debug-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-debug-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-debug-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.0.101-108.144.1.x86_64",
"product_id": "kernel-debug-extra-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-debug-hmac-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.144.1.x86_64",
"product_id": "kernel-default-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-default-extra-3.0.101-108.144.1.x86_64",
"product_id": "kernel-default-extra-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-default-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-default-hmac-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.144.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.144.1.x86_64",
"product_id": "kernel-ec2-extra-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-ec2-hmac-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.144.1.x86_64",
"product_id": "kernel-source-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.144.1.x86_64",
"product_id": "kernel-source-vanilla-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.144.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.144.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-trace-extra-3.0.101-108.144.1.x86_64",
"product_id": "kernel-trace-extra-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-trace-hmac-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-vanilla-3.0.101-108.144.1.x86_64",
"product_id": "kernel-vanilla-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-vanilla-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-vanilla-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-vanilla-hmac-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.144.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.144.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.144.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.0.101-108.144.1.x86_64",
"product_id": "kernel-xen-extra-3.0.101-108.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.144.1.x86_64",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.144.1.x86_64",
"product_id": "kernel-xen-hmac-3.0.101-108.144.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.144.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18344"
}
],
"notes": [
{
"category": "general",
"text": "The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn\u0027t properly validate the sigevent-\u003esigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18344",
"url": "https://www.suse.com/security/cve/CVE-2017-18344"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-18344",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1102851 for CVE-2017-18344",
"url": "https://bugzilla.suse.com/1102851"
},
{
"category": "external",
"summary": "SUSE Bug 1103203 for CVE-2017-18344",
"url": "https://bugzilla.suse.com/1103203"
},
{
"category": "external",
"summary": "SUSE Bug 1103580 for CVE-2017-18344",
"url": "https://bugzilla.suse.com/1103580"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2017-18344",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2017-18344"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2022-40982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-40982"
}
],
"notes": [
{
"category": "general",
"text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-40982",
"url": "https://www.suse.com/security/cve/CVE-2022-40982"
},
{
"category": "external",
"summary": "SUSE Bug 1206418 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1206418"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-40982",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2022-40982"
},
{
"cve": "CVE-2022-45919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-45919"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-45919",
"url": "https://www.suse.com/security/cve/CVE-2022-45919"
},
{
"category": "external",
"summary": "SUSE Bug 1205803 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1205803"
},
{
"category": "external",
"summary": "SUSE Bug 1208600 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208600"
},
{
"category": "external",
"summary": "SUSE Bug 1208912 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1208912"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2022-45919",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "important"
}
],
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2023-0459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-0459"
}
],
"notes": [
{
"category": "general",
"text": "Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the \"access_ok\" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-0459",
"url": "https://www.suse.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "SUSE Bug 1211738 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1211738"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-0459",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-0459"
},
{
"cve": "CVE-2023-20593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-20593"
}
],
"notes": [
{
"category": "general",
"text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-20593",
"url": "https://www.suse.com/security/cve/CVE-2023-20593"
},
{
"category": "external",
"summary": "SUSE Bug 1213286 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213286"
},
{
"category": "external",
"summary": "SUSE Bug 1213616 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1213616"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-20593",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-3141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3141"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3141",
"url": "https://www.suse.com/security/cve/CVE-2023-3141"
},
{
"category": "external",
"summary": "SUSE Bug 1212129 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1212129"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3141",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3159"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3159",
"url": "https://www.suse.com/security/cve/CVE-2023-3159"
},
{
"category": "external",
"summary": "SUSE Bug 1208600 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1208600"
},
{
"category": "external",
"summary": "SUSE Bug 1212128 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1212128"
},
{
"category": "external",
"summary": "SUSE Bug 1212347 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1212347"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1214128 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1214128"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3159",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "important"
}
],
"title": "CVE-2023-3159"
},
{
"cve": "CVE-2023-3161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3161"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font-\u003ewidth and font-\u003eheight greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3161",
"url": "https://www.suse.com/security/cve/CVE-2023-3161"
},
{
"category": "external",
"summary": "SUSE Bug 1212154 for CVE-2023-3161",
"url": "https://bugzilla.suse.com/1212154"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3161",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-3161"
},
{
"cve": "CVE-2023-3268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3268"
}
],
"notes": [
{
"category": "general",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3268",
"url": "https://www.suse.com/security/cve/CVE-2023-3268"
},
{
"category": "external",
"summary": "SUSE Bug 1212502 for CVE-2023-3268",
"url": "https://bugzilla.suse.com/1212502"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3268",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-3567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3567"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3567",
"url": "https://www.suse.com/security/cve/CVE-2023-3567"
},
{
"category": "external",
"summary": "SUSE Bug 1213167 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213167"
},
{
"category": "external",
"summary": "SUSE Bug 1213244 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213244"
},
{
"category": "external",
"summary": "SUSE Bug 1213842 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1213842"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3567",
"url": "https://bugzilla.suse.com/1217531"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "important"
}
],
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-35824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-35824"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-35824",
"url": "https://www.suse.com/security/cve/CVE-2023-35824"
},
{
"category": "external",
"summary": "SUSE Bug 1212501 for CVE-2023-35824",
"url": "https://bugzilla.suse.com/1212501"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-35824",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "moderate"
}
],
"title": "CVE-2023-35824"
},
{
"cve": "CVE-2023-3776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3776"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3776",
"url": "https://www.suse.com/security/cve/CVE-2023-3776"
},
{
"category": "external",
"summary": "SUSE Bug 1213588 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1213588"
},
{
"category": "external",
"summary": "SUSE Bug 1215119 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215119"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1215674"
},
{
"category": "external",
"summary": "SUSE Bug 1217444 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217444"
},
{
"category": "external",
"summary": "SUSE Bug 1217531 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1217531"
},
{
"category": "external",
"summary": "SUSE Bug 1221578 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221578"
},
{
"category": "external",
"summary": "SUSE Bug 1221598 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1221598"
},
{
"category": "external",
"summary": "SUSE Bug 1223091 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223091"
},
{
"category": "external",
"summary": "SUSE Bug 1223973 for CVE-2023-3776",
"url": "https://bugzilla.suse.com/1223973"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.144.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.144.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-08-16T10:45:46Z",
"details": "important"
}
],
"title": "CVE-2023-3776"
}
]
}
SUSE-SU-2018:1386-1
Vulnerability from csaf_suse - Published: 2018-05-23 11:01 - Updated: 2018-05-23 11:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n- CVE-2017-5715: This update has the next round of Spectre v2 related patches,\n which now integrates with corresponding changes in libvirt. A January 2018\n release of qemu initially addressed the Spectre v2 vulnerability for KVM guests\n by exposing the spec-ctrl feature for all x86 vcpu types. We remove that\n initial patch and now rely on patches from upstream (bsc#1068032).\n\n This update defines spec_ctrl and ibpb cpu feature flags as well as new cpu\n models which are clones of existing models with either -IBRS or -IBPB added to\n the end of the model name. These new vcpu models explicitly include the new\n feature(s), whereas the feature flags can be added to the cpu parameter as with\n other features. In short, for continued Spectre v2 protection, ensure that\n either the appropriate cpu feature flag is added to the QEMU command-line, or\n one of the new cpu models is used. Although migration from older versions is\n supported, the new cpu features won\u0027t be properly exposed to the guest until it\n is restarted with the cpu features explicitly added. A reboot is insufficient.\n- A patch is added to continue to detect Spectre v2 mitigation features (as\n shown by cpuid), and if found provide that feature to guests, even if running\n on older KVM (kernel) versions which do not yet expose that feature to QEMU.\n (bsc#1082276)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-968",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1386-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1386-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1386-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1082276",
"url": "https://bugzilla.suse.com/1082276"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-05-23T11:01:58Z",
"generator": {
"date": "2018-05-23T11:01:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1386-1",
"initial_release_date": "2018-05-23T11:01:58Z",
"revision_history": [
{
"date": "2018-05-23T11:01:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.40.2.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.40.2.noarch",
"product_id": "qemu-ipxe-1.0.0-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.40.2.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.40.2.noarch",
"product_id": "qemu-seabios-1.7.4-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.40.2.noarch",
"product": {
"name": "qemu-sgabios-8-48.40.2.noarch",
"product_id": "qemu-sgabios-8-48.40.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.40.2.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.40.2.noarch",
"product_id": "qemu-vgabios-1.7.4-48.40.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-lang-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.ppc64le",
"product_id": "qemu-tools-2.0.2-48.40.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-2.0.2-48.40.2.s390x",
"product_id": "qemu-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.s390x",
"product_id": "qemu-block-curl-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.40.2.s390x",
"product_id": "qemu-kvm-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.s390x",
"product_id": "qemu-lang-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.40.2.s390x",
"product_id": "qemu-s390-2.0.2-48.40.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.s390x",
"product_id": "qemu-tools-2.0.2-48.40.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-2.0.2-48.40.2.x86_64",
"product_id": "qemu-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.40.2.x86_64",
"product_id": "qemu-kvm-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.40.2.x86_64",
"product_id": "qemu-lang-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.40.2.x86_64",
"product_id": "qemu-tools-2.0.2-48.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.40.2.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.40.2.x86_64",
"product_id": "qemu-x86-2.0.2-48.40.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch"
},
"product_reference": "qemu-sgabios-8-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.40.2.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.40.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.40.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-23T11:01:58Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.40.2.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.40.2.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.40.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-05-23T11:01:58Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1658-1
Vulnerability from csaf_suse - Published: 2018-06-12 15:36 - Updated: 2018-06-12 15:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2018-3639: Prevent attackers with local user access from extracting information via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1092631).\n- CVE-2017-5753,CVE-2017-5715,CVE-2017-5754: Improved Spectre v2 mitigations (bsc#1074562).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1129",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1658-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1658-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181658-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1658-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html"
},
{
"category": "self",
"summary": "SUSE Bug 1074562",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "self",
"summary": "SUSE Bug 1092631",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5754 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2018-06-12T15:36:05Z",
"generator": {
"date": "2018-06-12T15:36:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1658-1",
"initial_release_date": "2018-06-12T15:36:05Z",
"revision_history": [
{
"date": "2018-06-12T15:36:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-doc-html-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-libs-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-tools-4.4.4_32-22.68.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_32-22.68.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_32-22.68.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_32-22.68.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2017-5754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5754"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5754",
"url": "https://www.suse.com/security/cve/CVE-2017-5754"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075008 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1075008"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5754",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "important"
}
],
"title": "CVE-2017-5754"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_32_k3.12.61_52.133-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_32-22.68.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_32-22.68.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-06-12T15:36:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2304-1
Vulnerability from csaf_suse - Published: 2018-08-10 20:25 - Updated: 2018-08-10 20:25Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libvirt",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libvirt fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2018-3639: Add support for \u0027ssbd\u0027 and \u0027virt-ssbd\u0027 CPUID feature bits to address V4 Speculative Store Bypass aka \u0027Memory Disambiguation\u0027 (bsc#1092885).\n\nBug fixes:\n\n- bsc#1094325: Enable virsh blockresize for XEN guests (FATE#325467).\n- bsc#1095556: Fix qemu VM creating with --boot uefi due to missing AppArmor profile.\n- bsc#1094725: Fix `virsh blockresize` to work with Xen qdisks.\n- bsc#1094480: Fix `virsh list` to list domains with `xl list`.\n- bsc#1087416: Fix missing video device within guest with default installation by virt-mamanger.\n- bsc#1079150: Fix libvirt-guests start dependency.\n- bsc#1076861: Fix locking of lockspace resource \u0027/devcfs/disks/uatidmsvn1-xvda\u0027.\n- bsc#1074014: Fix KVM live migration when shutting down cluster node.\n- bsc#959329: Fix wrong state of VMs in virtual manager.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-1545,SUSE-SLE-SDK-12-SP3-2018-1545,SUSE-SLE-SERVER-12-SP3-2018-1545",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2304-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2304-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182304-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2304-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html"
},
{
"category": "self",
"summary": "SUSE Bug 1074014",
"url": "https://bugzilla.suse.com/1074014"
},
{
"category": "self",
"summary": "SUSE Bug 1076861",
"url": "https://bugzilla.suse.com/1076861"
},
{
"category": "self",
"summary": "SUSE Bug 1079150",
"url": "https://bugzilla.suse.com/1079150"
},
{
"category": "self",
"summary": "SUSE Bug 1087416",
"url": "https://bugzilla.suse.com/1087416"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1094325",
"url": "https://bugzilla.suse.com/1094325"
},
{
"category": "self",
"summary": "SUSE Bug 1094480",
"url": "https://bugzilla.suse.com/1094480"
},
{
"category": "self",
"summary": "SUSE Bug 1094725",
"url": "https://bugzilla.suse.com/1094725"
},
{
"category": "self",
"summary": "SUSE Bug 1095556",
"url": "https://bugzilla.suse.com/1095556"
},
{
"category": "self",
"summary": "SUSE Bug 959329",
"url": "https://bugzilla.suse.com/959329"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for libvirt",
"tracking": {
"current_release_date": "2018-08-10T20:25:49Z",
"generator": {
"date": "2018-08-10T20:25:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2304-1",
"initial_release_date": "2018-08-10T20:25:49Z",
"revision_history": [
{
"date": "2018-08-10T20:25:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-devel-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-devel-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-admin-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-admin-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-client-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-client-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-doc-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-doc-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-libs-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-libs-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.22.1.aarch64",
"product": {
"name": "libvirt-nss-3.3.0-5.22.1.aarch64",
"product_id": "libvirt-nss-3.3.0-5.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-devel-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-devel-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-admin-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-admin-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-client-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-client-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-doc-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-doc-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-libs-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-libs-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.22.1.ppc64le",
"product": {
"name": "libvirt-nss-3.3.0-5.22.1.ppc64le",
"product_id": "libvirt-nss-3.3.0-5.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-devel-3.3.0-5.22.1.s390x",
"product_id": "libvirt-devel-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-3.3.0-5.22.1.s390x",
"product_id": "libvirt-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-admin-3.3.0-5.22.1.s390x",
"product_id": "libvirt-admin-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-client-3.3.0-5.22.1.s390x",
"product_id": "libvirt-client-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"product_id": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-doc-3.3.0-5.22.1.s390x",
"product_id": "libvirt-doc-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-libs-3.3.0-5.22.1.s390x",
"product_id": "libvirt-libs-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"product_id": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.22.1.s390x",
"product": {
"name": "libvirt-nss-3.3.0-5.22.1.s390x",
"product_id": "libvirt-nss-3.3.0-5.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-admin-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-admin-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-admin-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-client-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-client-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-client-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-doc-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-doc-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-doc-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-libs-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-libs-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-libs-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-devel-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-devel-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-devel-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "libvirt-nss-3.3.0-5.22.1.x86_64",
"product": {
"name": "libvirt-nss-3.3.0-5.22.1.x86_64",
"product_id": "libvirt-nss-3.3.0-5.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-devel-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-devel-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-devel-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-devel-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-admin-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-admin-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-client-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-doc-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-doc-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-libs-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-libs-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-nss-3.3.0-5.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64"
},
"product_reference": "libvirt-nss-3.3.0-5.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-admin-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-client-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-config-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-interface-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-libxl-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-network-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nodedev-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-nwfilter-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-secret-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-core-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-disk-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-iscsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-logical-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-mpath-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-rbd-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-driver-storage-scsi-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-hooks-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-lxc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-qemu-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-daemon-xen-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-doc-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-libs-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-lock-sanlock-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libvirt-nss-3.3.0-5.22.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libvirt-devel-3.3.0-5.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-10T20:25:49Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2019:2028-1
Vulnerability from csaf_suse - Published: 2019-07-31 11:34 - Updated: 2019-07-31 11:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for java-1_7_0-openjdk",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for java-1_7_0-openjdk to version 7u231 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE_2019-2426: Improve web server connections (bsc#1134297).\n- CVE-2019-2745: Improved ECC Implementation (bsc#1141784).\n- CVE-2019-2762: Exceptional throw cases (bsc#1141782).\n- CVE-2019-2766: Improve file protocol handling (bsc#1141789).\n- CVE-2019-2769: Better copies of CopiesList (bsc#1141783).\n- CVE-2019-2786: More limited privilege usage (bsc#1141787).\n- CVE-2019-2816: Normalize normalization (bsc#1141785).\n- CVE-2019-2842: Extended AES support (bsc#1141786).\n- CVE-2019-7317: Improve PNG support (bsc#1141780).\n- CVE-2018-3639: fix revision to prefer PR_SPEC_DISABLE_NOEXEC to PR_SPEC_DISABLE (bsc#1087082).\n- Certificate validation improvements\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2028,SUSE-SLE-DESKTOP-12-SP4-2019-2028,SUSE-SLE-SERVER-12-SP4-2019-2028",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2028-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2028-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192028-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2028-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1134297",
"url": "https://bugzilla.suse.com/1134297"
},
{
"category": "self",
"summary": "SUSE Bug 1141780",
"url": "https://bugzilla.suse.com/1141780"
},
{
"category": "self",
"summary": "SUSE Bug 1141782",
"url": "https://bugzilla.suse.com/1141782"
},
{
"category": "self",
"summary": "SUSE Bug 1141783",
"url": "https://bugzilla.suse.com/1141783"
},
{
"category": "self",
"summary": "SUSE Bug 1141784",
"url": "https://bugzilla.suse.com/1141784"
},
{
"category": "self",
"summary": "SUSE Bug 1141785",
"url": "https://bugzilla.suse.com/1141785"
},
{
"category": "self",
"summary": "SUSE Bug 1141786",
"url": "https://bugzilla.suse.com/1141786"
},
{
"category": "self",
"summary": "SUSE Bug 1141787",
"url": "https://bugzilla.suse.com/1141787"
},
{
"category": "self",
"summary": "SUSE Bug 1141789",
"url": "https://bugzilla.suse.com/1141789"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2426 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2745 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2762 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2766 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2769 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2786 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-2842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-2842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7317 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7317/"
}
],
"title": "Security update for java-1_7_0-openjdk",
"tracking": {
"current_release_date": "2019-07-31T11:34:53Z",
"generator": {
"date": "2019-07-31T11:34:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2028-1",
"initial_release_date": "2019-07-31T11:34:53Z",
"revision_history": [
{
"date": "2019-07-31T11:34:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.aarch64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.aarch64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.i586"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.i586",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.i586",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-javadoc-1.7.0.231-43.27.2.noarch",
"product": {
"name": "java-1_7_0-openjdk-javadoc-1.7.0.231-43.27.2.noarch",
"product_id": "java-1_7_0-openjdk-javadoc-1.7.0.231-43.27.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.ppc64le",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.ppc64le",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390x",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390x",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-accessibility-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
}
},
{
"category": "product_version",
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.x86_64",
"product": {
"name": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.x86_64",
"product_id": "java-1_7_0-openjdk-src-1.7.0.231-43.27.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
},
"product_reference": "java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2019-2426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2426"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2426",
"url": "https://www.suse.com/security/cve/CVE-2019-2426"
},
{
"category": "external",
"summary": "SUSE Bug 1134297 for CVE-2019-2426",
"url": "https://bugzilla.suse.com/1134297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2426"
},
{
"cve": "CVE-2019-2745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2745"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2745",
"url": "https://www.suse.com/security/cve/CVE-2019-2745"
},
{
"category": "external",
"summary": "SUSE Bug 1141784 for CVE-2019-2745",
"url": "https://bugzilla.suse.com/1141784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2745"
},
{
"cve": "CVE-2019-2762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2762"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2762",
"url": "https://www.suse.com/security/cve/CVE-2019-2762"
},
{
"category": "external",
"summary": "SUSE Bug 1141782 for CVE-2019-2762",
"url": "https://bugzilla.suse.com/1141782"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2762",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2762"
},
{
"cve": "CVE-2019-2766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2766"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2766",
"url": "https://www.suse.com/security/cve/CVE-2019-2766"
},
{
"category": "external",
"summary": "SUSE Bug 1141789 for CVE-2019-2766",
"url": "https://bugzilla.suse.com/1141789"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2766",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2766"
},
{
"cve": "CVE-2019-2769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2769"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2769",
"url": "https://www.suse.com/security/cve/CVE-2019-2769"
},
{
"category": "external",
"summary": "SUSE Bug 1141783 for CVE-2019-2769",
"url": "https://bugzilla.suse.com/1141783"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2769",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2769"
},
{
"cve": "CVE-2019-2786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2786"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2786",
"url": "https://www.suse.com/security/cve/CVE-2019-2786"
},
{
"category": "external",
"summary": "SUSE Bug 1141787 for CVE-2019-2786",
"url": "https://bugzilla.suse.com/1141787"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2786",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2786"
},
{
"cve": "CVE-2019-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2816"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2816",
"url": "https://www.suse.com/security/cve/CVE-2019-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1141785 for CVE-2019-2816",
"url": "https://bugzilla.suse.com/1141785"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-2816",
"url": "https://bugzilla.suse.com/1147021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2816"
},
{
"cve": "CVE-2019-2842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-2842"
}
],
"notes": [
{
"category": "general",
"text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-2842",
"url": "https://www.suse.com/security/cve/CVE-2019-2842"
},
{
"category": "external",
"summary": "SUSE Bug 1141786 for CVE-2019-2842",
"url": "https://bugzilla.suse.com/1141786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-2842"
},
{
"cve": "CVE-2019-7317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7317"
}
],
"notes": [
{
"category": "general",
"text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7317",
"url": "https://www.suse.com/security/cve/CVE-2019-7317"
},
{
"category": "external",
"summary": "SUSE Bug 1124211 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1124211"
},
{
"category": "external",
"summary": "SUSE Bug 1135824 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1135824"
},
{
"category": "external",
"summary": "SUSE Bug 1141780 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1141780"
},
{
"category": "external",
"summary": "SUSE Bug 1147021 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1147021"
},
{
"category": "external",
"summary": "SUSE Bug 1165297 for CVE-2019-7317",
"url": "https://bugzilla.suse.com/1165297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.231-43.27.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.231-43.27.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-31T11:34:53Z",
"details": "moderate"
}
],
"title": "CVE-2019-7317"
}
]
}
SUSE-SU-2018:2556-1
Vulnerability from csaf_suse - Published: 2018-08-30 06:45 - Updated: 2018-08-30 06:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following security issues:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS\n (bsc#1098735) \n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-2018-1793",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2556-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2556-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182556-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2556-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-08-30T06:45:12Z",
"generator": {
"date": "2018-08-30T06:45:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2556-1",
"initial_release_date": "2018-08-30T06:45:12Z",
"revision_history": [
{
"date": "2018-08-30T06:45:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-48.43.3.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-48.43.3.noarch",
"product_id": "qemu-ipxe-1.0.0-48.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.7.4-48.43.3.noarch",
"product": {
"name": "qemu-seabios-1.7.4-48.43.3.noarch",
"product_id": "qemu-seabios-1.7.4-48.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-48.43.3.noarch",
"product": {
"name": "qemu-sgabios-8-48.43.3.noarch",
"product_id": "qemu-sgabios-8-48.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.7.4-48.43.3.noarch",
"product": {
"name": "qemu-vgabios-1.7.4-48.43.3.noarch",
"product_id": "qemu-vgabios-1.7.4-48.43.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-2.0.2-48.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-block-curl-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-block-curl-2.0.2-48.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-guest-agent-2.0.2-48.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-lang-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-lang-2.0.2-48.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-ppc-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-ppc-2.0.2-48.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.43.3.ppc64le",
"product": {
"name": "qemu-tools-2.0.2-48.43.3.ppc64le",
"product_id": "qemu-tools-2.0.2-48.43.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-2.0.2-48.43.3.s390x",
"product_id": "qemu-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-block-curl-2.0.2-48.43.3.s390x",
"product_id": "qemu-block-curl-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-guest-agent-2.0.2-48.43.3.s390x",
"product_id": "qemu-guest-agent-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-kvm-2.0.2-48.43.3.s390x",
"product_id": "qemu-kvm-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-lang-2.0.2-48.43.3.s390x",
"product_id": "qemu-lang-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-s390-2.0.2-48.43.3.s390x",
"product_id": "qemu-s390-2.0.2-48.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.43.3.s390x",
"product": {
"name": "qemu-tools-2.0.2-48.43.3.s390x",
"product_id": "qemu-tools-2.0.2-48.43.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-2.0.2-48.43.3.x86_64",
"product_id": "qemu-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-block-curl-2.0.2-48.43.3.x86_64",
"product_id": "qemu-block-curl-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-block-rbd-2.0.2-48.43.3.x86_64",
"product_id": "qemu-block-rbd-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-guest-agent-2.0.2-48.43.3.x86_64",
"product_id": "qemu-guest-agent-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-kvm-2.0.2-48.43.3.x86_64",
"product_id": "qemu-kvm-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-lang-2.0.2-48.43.3.x86_64",
"product_id": "qemu-lang-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-tools-2.0.2-48.43.3.x86_64",
"product_id": "qemu-tools-2.0.2-48.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.0.2-48.43.3.x86_64",
"product": {
"name": "qemu-x86-2.0.2-48.43.3.x86_64",
"product_id": "qemu-x86-2.0.2-48.43.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-block-curl-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-block-curl-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-guest-agent-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-48.43.3.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-48.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-kvm-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-lang-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-lang-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-lang-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-ppc-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-s390-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.7.4-48.43.3.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch"
},
"product_reference": "qemu-seabios-1.7.4-48.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-48.43.3.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-48.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.43.3.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le"
},
"product_reference": "qemu-tools-2.0.2-48.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.43.3.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x"
},
"product_reference": "qemu-tools-2.0.2-48.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-tools-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.7.4-48.43.3.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.7.4-48.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.0.2-48.43.3.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
},
"product_reference": "qemu-x86-2.0.2-48.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T06:45:12Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T06:45:12Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-curl-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-block-rbd-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-guest-agent-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ipxe-1.0.0-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-kvm-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-lang-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-ppc-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-s390-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-seabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-sgabios-8-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.s390x",
"SUSE Linux Enterprise Server 12-LTSS:qemu-tools-2.0.2-48.43.3.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:qemu-vgabios-1.7.4-48.43.3.noarch",
"SUSE Linux Enterprise Server 12-LTSS:qemu-x86-2.0.2-48.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-30T06:45:12Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:2335-1
Vulnerability from csaf_suse - Published: 2018-08-15 14:01 - Updated: 2018-08-15 14:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update to ucode-intel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nucode-intel was updated to the 20180807 release.\n\nFor the listed CPU chipsets this fixes CVE-2018-3640 (Spectre v3a), and is part of the \nmitigations for CVE-2018-3639 (Spectre v4) and CVE-2018-3646 (L1 Terminal Fault).\n(bsc#1104134 bsc#1087082 bsc#1087083 bsc#1089343)\n\n Processor Identifier Version Products\n\n Model Stepping F-MO-S/PI Old-\u003eNew\n\n ---- new platforms ----------------------------------------\n WSM-EP/WS U1 6-2c-2/03 0000001f Xeon E/L/X56xx, W36xx\n NHM-EX D0 6-2e-6/04 0000000d Xeon E/L/X65xx/75xx\n BXT C0 6-5c-2/01 00000014 Atom T5500/5700\n APL E0 6-5c-a/03 0000000c Atom x5-E39xx\n DVN B0 6-5f-1/01 00000024 Atom C3xxx\n ---- updated platforms ------------------------------------\n NHM-EP/WS D0 6-1a-5/03 00000019-\u003e0000001d Xeon E/L/X/W55xx\n NHM B1 6-1e-5/13 00000007-\u003e0000000a Core i7-8xx, i5-7xx; Xeon L3426, X24xx\n WSM B1 6-25-2/12 0000000e-\u003e00000011 Core i7-6xx, i5-6xx/4xxM, i3-5xx/3xxM, Pentium G69xx, Celeon P45xx; Xeon L3406\n WSM K0 6-25-5/92 00000004-\u003e00000007 Core i7-6xx, i5-6xx/5xx/4xx, i3-5xx/3xx, Pentium G69xx/P6xxx/U5xxx, Celeron P4xxx/U3xxx\n SNB D2 6-2a-7/12 0000002d-\u003e0000002e Core Gen2; Xeon E3\n WSM-EX A2 6-2f-2/05 00000037-\u003e0000003b Xeon E7\n IVB E2 6-3a-9/12 0000001f-\u003e00000020 Core Gen3 Mobile\n HSW-H/S/E3 Cx/Dx 6-3c-3/32 00000024-\u003e00000025 Core Gen4 Desktop; Xeon E3 v3\n BDW-U/Y E/F 6-3d-4/c0 0000002a-\u003e0000002b Core Gen5 Mobile\n HSW-ULT Cx/Dx 6-45-1/72 00000023-\u003e00000024 Core Gen4 Mobile and derived Pentium/Celeron\n HSW-H Cx 6-46-1/32 00000019-\u003e0000001a Core Extreme i7-5xxxX\n BDW-H/E3 E/G 6-47-1/22 0000001d-\u003e0000001e Core i5-5xxxR/C, i7-5xxxHQ/EQ; Xeon E3 v4\n SKL-U/Y D0 6-4e-3/c0 000000c2-\u003e000000c6 Core Gen6 Mobile\n BDX-DE V1 6-56-2/10 00000015-\u003e00000017 Xeon D-1520/40\n BDX-DE V2/3 6-56-3/10 07000012-\u003e07000013 Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19\n BDX-DE Y0 6-56-4/10 0f000011-\u003e0f000012 Xeon D-1557/59/67/71/77/81/87\n APL D0 6-5c-9/03 0000002c-\u003e00000032 Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx\n SKL-H/S/E3 R0 6-5e-3/36 000000c2-\u003e000000c6 Core Gen6; Xeon E3 v5\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-microcode_ctl-13730,slessp3-microcode_ctl-13730,slessp4-microcode_ctl-13730",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2335-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2335-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182335-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2335-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1087083",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "self",
"summary": "SUSE Bug 1089343",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "self",
"summary": "SUSE Bug 1104134",
"url": "https://bugzilla.suse.com/1104134"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3646 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3646/"
}
],
"title": "Security update to ucode-intel",
"tracking": {
"current_release_date": "2018-08-15T14:01:48Z",
"generator": {
"date": "2018-08-15T14:01:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2335-1",
"initial_release_date": "2018-08-15T14:01:48Z",
"revision_history": [
{
"date": "2018-08-15T14:01:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.27.1.i586",
"product": {
"name": "microcode_ctl-1.17-102.83.27.1.i586",
"product_id": "microcode_ctl-1.17-102.83.27.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "microcode_ctl-1.17-102.83.27.1.x86_64",
"product": {
"name": "microcode_ctl-1.17-102.83.27.1.x86_64",
"product_id": "microcode_ctl-1.17-102.83.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "microcode_ctl-1.17-102.83.27.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
},
"product_reference": "microcode_ctl-1.17-102.83.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T14:01:48Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3640"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3640",
"url": "https://www.suse.com/security/cve/CVE-2018-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087083 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1087083"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 1175912 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1175912"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3640",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T14:01:48Z",
"details": "moderate"
}
],
"title": "CVE-2018-3640"
},
{
"cve": "CVE-2018-3646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3646"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3646",
"url": "https://www.suse.com/security/cve/CVE-2018-3646"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087081 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1087081"
},
{
"category": "external",
"summary": "SUSE Bug 1089343 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1089343"
},
{
"category": "external",
"summary": "SUSE Bug 1091107 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1091107"
},
{
"category": "external",
"summary": "SUSE Bug 1099306 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1099306"
},
{
"category": "external",
"summary": "SUSE Bug 1104365 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104365"
},
{
"category": "external",
"summary": "SUSE Bug 1104894 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1104894"
},
{
"category": "external",
"summary": "SUSE Bug 1106548 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1106548"
},
{
"category": "external",
"summary": "SUSE Bug 1113534 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1113534"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3646",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:microcode_ctl-1.17-102.83.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-08-15T14:01:48Z",
"details": "important"
}
],
"title": "CVE-2018-3646"
}
]
}
SUSE-SU-2018:2973-1
Vulnerability from csaf_suse - Published: 2018-10-02 11:58 - Updated: 2018-10-02 11:58Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following security issues:\n\n- CVE-2018-12617: qmp_guest_file_read had an integer overflow that could have\n been exploited by sending a crafted QMP command (including guest-file-read with\n a large count value) to the agent via the listening socket causing DoS (bsc#1098735)\n- CVE-2018-11806: Prevent heap-based buffer overflow via incoming fragmented\n datagrams (bsc#1096223)\n\nWith this release the mitigations for Spectre v4 are moved the the patches from\nupstream (CVE-2018-3639, bsc#1092885).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-7-2018-2116,SUSE-SLE-SAP-12-SP2-2018-2116,SUSE-SLE-SERVER-12-SP2-2018-2116,SUSE-Storage-4-2018-2116",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2973-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2973-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182973-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2973-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE Bug 1096223",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "self",
"summary": "SUSE Bug 1098735",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12617 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-10-02T11:58:05Z",
"generator": {
"date": "2018-10-02T11:58:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2973-1",
"initial_release_date": "2018-10-02T11:58:05Z",
"revision_history": [
{
"date": "2018-10-02T11:58:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.43.3.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch",
"product_id": "qemu-ipxe-1.0.0-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.43.3.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch",
"product_id": "qemu-seabios-1.9.1-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.43.3.noarch",
"product": {
"name": "qemu-sgabios-8-41.43.3.noarch",
"product_id": "qemu-sgabios-8-41.43.3.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.43.3.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch",
"product_id": "qemu-vgabios-1.9.1-41.43.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-block-curl-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-block-curl-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-block-ssh-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-guest-agent-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-lang-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-lang-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-ppc-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-ppc-2.6.2-41.43.3.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.43.3.ppc64le",
"product": {
"name": "qemu-tools-2.6.2-41.43.3.ppc64le",
"product_id": "qemu-tools-2.6.2-41.43.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-2.6.2-41.43.3.s390x",
"product_id": "qemu-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-block-curl-2.6.2-41.43.3.s390x",
"product_id": "qemu-block-curl-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-block-ssh-2.6.2-41.43.3.s390x",
"product_id": "qemu-block-ssh-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-guest-agent-2.6.2-41.43.3.s390x",
"product_id": "qemu-guest-agent-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-kvm-2.6.2-41.43.3.s390x",
"product_id": "qemu-kvm-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-lang-2.6.2-41.43.3.s390x",
"product_id": "qemu-lang-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-s390-2.6.2-41.43.3.s390x",
"product_id": "qemu-s390-2.6.2-41.43.3.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.43.3.s390x",
"product": {
"name": "qemu-tools-2.6.2-41.43.3.s390x",
"product_id": "qemu-tools-2.6.2-41.43.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-2.6.2-41.43.3.x86_64",
"product_id": "qemu-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64",
"product_id": "qemu-kvm-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64",
"product_id": "qemu-lang-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64",
"product_id": "qemu-tools-2.6.2-41.43.3.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.43.3.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64",
"product_id": "qemu-x86-2.6.2-41.43.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.43.3.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.43.3.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-41.43.3.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.43.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-ppc-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-s390-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.43.3.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.43.3.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.43.3.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.43.3.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch"
},
"product_reference": "qemu-sgabios-8-41.43.3.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.43.3.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.43.3.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.43.3.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.43.3.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-02T11:58:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12617"
}
],
"notes": [
{
"category": "general",
"text": "qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12617",
"url": "https://www.suse.com/security/cve/CVE-2018-12617"
},
{
"category": "external",
"summary": "SUSE Bug 1098735 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098735"
},
{
"category": "external",
"summary": "SUSE Bug 1098744 for CVE-2018-12617",
"url": "https://bugzilla.suse.com/1098744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-02T11:58:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-12617"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:qemu-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-sgabios-8-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Enterprise Storage 4:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Enterprise Storage 4:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-ppc-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-sgabios-8-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:qemu-x86-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-curl-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-rbd-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-block-ssh-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-guest-agent-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-ipxe-1.0.0-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-kvm-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-lang-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-s390-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-seabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-sgabios-8-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.s390x",
"SUSE OpenStack Cloud 7:qemu-tools-2.6.2-41.43.3.x86_64",
"SUSE OpenStack Cloud 7:qemu-vgabios-1.9.1-41.43.3.noarch",
"SUSE OpenStack Cloud 7:qemu-x86-2.6.2-41.43.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-02T11:58:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
SUSE-SU-2018:1362-2
Vulnerability from csaf_suse - Published: 2018-10-18 12:45 - Updated: 2018-10-18 12:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes several issues.\n\nThis security issue was fixed:\n\n- CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and speculative\n execution of memory reads before the addresses of all prior memory writes are\n known may allow unauthorized disclosure of information to an attacker with\n local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named \u0027ssbd\u0027 to be\n presented to the guest, given that the host has this feature, and\n KVM exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd\n so the guest OS can take advantage of the feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\nThis feature was added:\n\n- Add support for block resize support for xen disks through the monitor\n\nThis non-security issue was fixed:\n\n- bsc#1079405: Add new look up path \u0027sys/class/tpm\u0027 for tpm cancel path based\n on Linux 4.0 change\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-946",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1362-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:1362-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181362-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:1362-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html"
},
{
"category": "self",
"summary": "SUSE Bug 1079405",
"url": "https://bugzilla.suse.com/1079405"
},
{
"category": "self",
"summary": "SUSE Bug 1092885",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2018-10-18T12:45:32Z",
"generator": {
"date": "2018-10-18T12:45:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:1362-2",
"initial_release_date": "2018-10-18T12:45:32Z",
"revision_history": [
{
"date": "2018-10-18T12:45:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0-41.40.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch",
"product_id": "qemu-ipxe-1.0.0-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.9.1-41.40.1.noarch",
"product": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch",
"product_id": "qemu-seabios-1.9.1-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-41.40.1.noarch",
"product": {
"name": "qemu-sgabios-8-41.40.1.noarch",
"product_id": "qemu-sgabios-8-41.40.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.9.1-41.40.1.noarch",
"product": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch",
"product_id": "qemu-vgabios-1.9.1-41.40.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-2.6.2-41.40.1.x86_64",
"product_id": "qemu-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-curl-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-rbd-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"product_id": "qemu-block-ssh-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"product_id": "qemu-guest-agent-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64",
"product_id": "qemu-kvm-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64",
"product_id": "qemu-lang-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64",
"product_id": "qemu-tools-2.6.2-41.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.6.2-41.40.1.x86_64",
"product": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64",
"product_id": "qemu-x86-2.6.2-41.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-curl-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.40.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-kvm-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-lang-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-seabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.40.1.noarch"
},
"product_reference": "qemu-sgabios-8-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-tools-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.9.1-41.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.40.1.noarch"
},
"product_reference": "qemu-vgabios-1.9.1-41.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.6.2-41.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.40.1.x86_64"
},
"product_reference": "qemu-x86-2.6.2-41.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-curl-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-rbd-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-block-ssh-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-guest-agent-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-ipxe-1.0.0-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-kvm-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-lang-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-seabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-sgabios-8-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-tools-2.6.2-41.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-vgabios-1.9.1-41.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:qemu-x86-2.6.2-41.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-18T12:45:32Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
}
]
}
GSD-2018-3639
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-3639",
"description": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"id": "GSD-2018-3639",
"references": [
"https://www.suse.com/security/cve/CVE-2018-3639.html",
"https://www.debian.org/security/2018/dsa-4273",
"https://www.debian.org/security/2018/dsa-4210",
"https://access.redhat.com/errata/RHSA-2019:1046",
"https://access.redhat.com/errata/RHSA-2019:0148",
"https://access.redhat.com/errata/RHSA-2018:3425",
"https://access.redhat.com/errata/RHSA-2018:3424",
"https://access.redhat.com/errata/RHSA-2018:3423",
"https://access.redhat.com/errata/RHSA-2018:3407",
"https://access.redhat.com/errata/RHSA-2018:3402",
"https://access.redhat.com/errata/RHSA-2018:3401",
"https://access.redhat.com/errata/RHSA-2018:3400",
"https://access.redhat.com/errata/RHSA-2018:3399",
"https://access.redhat.com/errata/RHSA-2018:3398",
"https://access.redhat.com/errata/RHSA-2018:3397",
"https://access.redhat.com/errata/RHSA-2018:3396",
"https://access.redhat.com/errata/RHSA-2018:2948",
"https://access.redhat.com/errata/RHSA-2018:2396",
"https://access.redhat.com/errata/RHSA-2018:2394",
"https://access.redhat.com/errata/RHSA-2018:2387",
"https://access.redhat.com/errata/RHSA-2018:2364",
"https://access.redhat.com/errata/RHSA-2018:2363",
"https://access.redhat.com/errata/RHSA-2018:2328",
"https://access.redhat.com/errata/RHSA-2018:2309",
"https://access.redhat.com/errata/RHSA-2018:2289",
"https://access.redhat.com/errata/RHSA-2018:2258",
"https://access.redhat.com/errata/RHSA-2018:2250",
"https://access.redhat.com/errata/RHSA-2018:2246",
"https://access.redhat.com/errata/RHSA-2018:2228",
"https://access.redhat.com/errata/RHSA-2018:2216",
"https://access.redhat.com/errata/RHSA-2018:2172",
"https://access.redhat.com/errata/RHSA-2018:2171",
"https://access.redhat.com/errata/RHSA-2018:2164",
"https://access.redhat.com/errata/RHSA-2018:2162",
"https://access.redhat.com/errata/RHSA-2018:2161",
"https://access.redhat.com/errata/RHSA-2018:2060",
"https://access.redhat.com/errata/RHSA-2018:2006",
"https://access.redhat.com/errata/RHSA-2018:2003",
"https://access.redhat.com/errata/RHSA-2018:2001",
"https://access.redhat.com/errata/RHSA-2018:1997",
"https://access.redhat.com/errata/RHSA-2018:1967",
"https://access.redhat.com/errata/RHSA-2018:1965",
"https://access.redhat.com/errata/RHSA-2018:1854",
"https://access.redhat.com/errata/RHSA-2018:1826",
"https://access.redhat.com/errata/RHSA-2018:1738",
"https://access.redhat.com/errata/RHSA-2018:1737",
"https://access.redhat.com/errata/RHSA-2018:1711",
"https://access.redhat.com/errata/RHSA-2018:1710",
"https://access.redhat.com/errata/RHSA-2018:1696",
"https://access.redhat.com/errata/RHSA-2018:1690",
"https://access.redhat.com/errata/RHSA-2018:1689",
"https://access.redhat.com/errata/RHSA-2018:1688",
"https://access.redhat.com/errata/RHSA-2018:1686",
"https://access.redhat.com/errata/RHSA-2018:1676",
"https://access.redhat.com/errata/RHSA-2018:1675",
"https://access.redhat.com/errata/RHSA-2018:1674",
"https://access.redhat.com/errata/RHSA-2018:1669",
"https://access.redhat.com/errata/RHSA-2018:1668",
"https://access.redhat.com/errata/RHSA-2018:1667",
"https://access.redhat.com/errata/RHSA-2018:1666",
"https://access.redhat.com/errata/RHSA-2018:1665",
"https://access.redhat.com/errata/RHSA-2018:1664",
"https://access.redhat.com/errata/RHSA-2018:1663",
"https://access.redhat.com/errata/RHSA-2018:1662",
"https://access.redhat.com/errata/RHSA-2018:1661",
"https://access.redhat.com/errata/RHSA-2018:1660",
"https://access.redhat.com/errata/RHSA-2018:1659",
"https://access.redhat.com/errata/RHSA-2018:1658",
"https://access.redhat.com/errata/RHSA-2018:1657",
"https://access.redhat.com/errata/RHSA-2018:1656",
"https://access.redhat.com/errata/RHSA-2018:1655",
"https://access.redhat.com/errata/RHSA-2018:1654",
"https://access.redhat.com/errata/RHSA-2018:1653",
"https://access.redhat.com/errata/RHSA-2018:1652",
"https://access.redhat.com/errata/RHSA-2018:1651",
"https://access.redhat.com/errata/RHSA-2018:1650",
"https://access.redhat.com/errata/RHSA-2018:1649",
"https://access.redhat.com/errata/RHSA-2018:1648",
"https://access.redhat.com/errata/RHSA-2018:1647",
"https://access.redhat.com/errata/RHSA-2018:1646",
"https://access.redhat.com/errata/RHSA-2018:1645",
"https://access.redhat.com/errata/RHSA-2018:1644",
"https://access.redhat.com/errata/RHSA-2018:1643",
"https://access.redhat.com/errata/RHSA-2018:1642",
"https://access.redhat.com/errata/RHSA-2018:1641",
"https://access.redhat.com/errata/RHSA-2018:1640",
"https://access.redhat.com/errata/RHSA-2018:1639",
"https://access.redhat.com/errata/RHSA-2018:1638",
"https://access.redhat.com/errata/RHSA-2018:1637",
"https://access.redhat.com/errata/RHSA-2018:1636",
"https://access.redhat.com/errata/RHSA-2018:1635",
"https://access.redhat.com/errata/RHSA-2018:1633",
"https://access.redhat.com/errata/RHSA-2018:1632",
"https://access.redhat.com/errata/RHSA-2018:1630",
"https://access.redhat.com/errata/RHSA-2018:1629",
"https://ubuntu.com/security/CVE-2018-3639",
"https://advisories.mageia.org/CVE-2018-3639.html",
"https://alas.aws.amazon.com/cve/html/CVE-2018-3639.html",
"https://linux.oracle.com/cve/CVE-2018-3639.html",
"https://packetstormsecurity.com/files/cve/CVE-2018-3639"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-3639"
],
"details": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"id": "GSD-2018-3639",
"modified": "2023-12-13T01:22:43.695288Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-05-21T00:00:00",
"ID": "CVE-2018-3639",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Multiple",
"version": {
"version_data": [
{
"version_value": "Multiple"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:1689",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"name": "RHSA-2018:2162",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"name": "RHSA-2018:1641",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"name": "USN-3680-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"name": "RHSA-2018:1997",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"name": "RHSA-2018:1665",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"name": "RHSA-2018:3407",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "RHSA-2018:2001",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"name": "RHSA-2018:3423",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"name": "RHSA-2018:2003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"name": "USN-3654-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"name": "RHSA-2018:1645",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"name": "RHSA-2018:1643",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"name": "RHSA-2018:1652",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"name": "RHSA-2018:3424",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"name": "RHSA-2018:3402",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"name": "TA18-141A",
"refsource": "CERT",
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"name": "RHSA-2018:1656",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"name": "RHSA-2018:1664",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"name": "RHSA-2018:2258",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"name": "RHSA-2018:1688",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"name": "RHSA-2018:1658",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"name": "RHSA-2018:1657",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"name": "RHSA-2018:2289",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"name": "RHSA-2018:1666",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "RHSA-2018:1675",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"name": "RHSA-2018:1660",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"name": "RHSA-2018:1965",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"name": "RHSA-2018:1661",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"name": "RHSA-2018:1633",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"name": "RHSA-2018:1636",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"name": "RHSA-2018:1854",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"name": "RHSA-2018:2006",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"name": "RHSA-2018:2250",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"name": "1040949",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040949"
},
{
"name": "RHSA-2018:3401",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"name": "RHSA-2018:1737",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"name": "RHSA-2018:1826",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"name": "USN-3651-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"name": "DSA-4210",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"name": "44695",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"name": "RHSA-2018:1651",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"name": "RHSA-2018:1638",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"name": "RHSA-2018:1696",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"name": "RHSA-2018:2246",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"name": "RHSA-2018:1644",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"name": "RHSA-2018:1646",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name": "RHSA-2018:1639",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"name": "RHSA-2018:1668",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"name": "RHSA-2018:1637",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "RHSA-2018:1686",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"name": "RHSA-2018:2172",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"name": "RHSA-2018:1663",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"name": "USN-3652-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"name": "RHSA-2018:1629",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"name": "RHSA-2018:1655",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"name": "RHSA-2018:1640",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"name": "RHSA-2018:1669",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"name": "RHSA-2018:1676",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"name": "RHSA-2018:3425",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"name": "RHSA-2018:2363",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"name": "RHSA-2018:1632",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"name": "RHSA-2018:1650",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"name": "RHSA-2018:2396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name": "RHSA-2018:2364",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"name": "USN-3653-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"name": "RHSA-2018:2216",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"name": "USN-3655-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"name": "RHSA-2018:1649",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"name": "RHSA-2018:2309",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"name": "104232",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104232"
},
{
"name": "RHSA-2018:1653",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"name": "RHSA-2018:2171",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"name": "RHSA-2018:1635",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name": "RHSA-2018:1710",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"name": "RHSA-2018:1659",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"name": "RHSA-2018:1711",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"name": "DSA-4273",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"name": "RHSA-2018:1738",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"name": "RHSA-2018:1674",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"name": "RHSA-2018:3396",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"name": "RHSA-2018:1667",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"name": "USN-3654-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"name": "RHSA-2018:1662",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"name": "RHSA-2018:1630",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"name": "RHSA-2018:1647",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"name": "RHSA-2018:1967",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"name": "USN-3655-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"name": "RHSA-2018:3399",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"name": "RHSA-2018:2060",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"name": "RHSA-2018:1690",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"name": "USN-3653-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"name": "RHSA-2018:2161",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"name": "RHSA-2018:2328",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"name": "RHSA-2018:1648",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"name": "RHSA-2018:2387",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name": "RHSA-2019:0148",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"name": "RHSA-2018:1654",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"name": "USN-3679-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "RHSA-2018:1642",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"name": "RHSA-2018:3397",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "USN-3756-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name": "RHSA-2018:3398",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"name": "RHSA-2018:3400",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"name": "RHSA-2018:2228",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"name": "RHSA-2019:1046",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"name": "openSUSE-SU-2019:1439",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"name": "openSUSE-SU-2019:1438",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"name": "http://support.lenovo.com/us/en/solutions/LEN-22133",
"refsource": "CONFIRM",
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004",
"refsource": "CONFIRM",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012",
"refsource": "CONFIRM",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"name": "https://support.citrix.com/article/CTX235225",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX235225"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_23",
"refsource": "CONFIRM",
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html",
"refsource": "CONFIRM",
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-263.html",
"refsource": "CONFIRM",
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006",
"refsource": "CONFIRM",
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"refsource": "MISC",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180521-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html",
"refsource": "CONFIRM",
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"name": "openSUSE-SU-2020:1325",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "18.01.09",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "22.01.06",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.5",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "r1.30.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "r1.23.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.01.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "19.01.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.01.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "19.01.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "23.01.04",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.6",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "7.6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "r28.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "r28.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-3639"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "TA18-141A",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"name": "https://www.synology.com/support/security/Synology_SA_18_23",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"name": "VU#180049",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"name": "USN-3655-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"name": "USN-3654-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"name": "USN-3654-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"name": "USN-3653-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"name": "USN-3653-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"name": "USN-3652-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"name": "USN-3651-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"name": "https://support.citrix.com/article/CTX235225",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235225"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180521-0001/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"name": "RHSA-2018:1660",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"name": "RHSA-2018:1655",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"name": "RHSA-2018:1647",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"name": "RHSA-2018:1630",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"name": "http://xenbits.xen.org/xsa/advisory-263.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"name": "1040949",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040949"
},
{
"name": "http://support.lenovo.com/us/en/solutions/LEN-22133",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"name": "RHSA-2018:1690",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"name": "RHSA-2018:1689",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"name": "RHSA-2018:1688",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"name": "RHSA-2018:1686",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"name": "RHSA-2018:1676",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"name": "RHSA-2018:1675",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"name": "RHSA-2018:1674",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"name": "RHSA-2018:1669",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"name": "RHSA-2018:1668",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"name": "RHSA-2018:1667",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"name": "RHSA-2018:1666",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"name": "RHSA-2018:1665",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"name": "RHSA-2018:1664",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"name": "RHSA-2018:1663",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"name": "RHSA-2018:1662",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"name": "RHSA-2018:1661",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"name": "RHSA-2018:1659",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"name": "RHSA-2018:1658",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"name": "RHSA-2018:1657",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"name": "RHSA-2018:1656",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"name": "RHSA-2018:1654",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"name": "RHSA-2018:1653",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"name": "RHSA-2018:1652",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"name": "RHSA-2018:1651",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"name": "RHSA-2018:1650",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"name": "RHSA-2018:1649",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"name": "RHSA-2018:1648",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"name": "RHSA-2018:1646",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"name": "RHSA-2018:1645",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"name": "RHSA-2018:1644",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"name": "RHSA-2018:1643",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"name": "RHSA-2018:1642",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"name": "RHSA-2018:1636",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"name": "RHSA-2018:1635",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"name": "RHSA-2018:1633",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"name": "RHSA-2018:1632",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"name": "RHSA-2018:1629",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"name": "104232",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104232"
},
{
"name": "44695",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"name": "RHSA-2018:1711",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"name": "RHSA-2018:1710",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"name": "RHSA-2018:1696",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"name": "DSA-4210",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"name": "USN-3655-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"name": "RHSA-2018:1738",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"name": "RHSA-2018:1737",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"name": "RHSA-2018:1641",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"name": "RHSA-2018:1640",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"name": "RHSA-2018:1639",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"name": "RHSA-2018:1638",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"name": "RHSA-2018:1637",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"name": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"name": "USN-3680-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"name": "USN-3679-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"name": "RHSA-2018:1826",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"name": "RHSA-2018:1854",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"name": "RHSA-2018:2006",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"name": "RHSA-2018:2003",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"name": "RHSA-2018:2001",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"name": "RHSA-2018:1997",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"name": "RHSA-2018:1967",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"name": "RHSA-2018:1965",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"name": "RHSA-2018:2060",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"name": "RHSA-2018:2164",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"name": "RHSA-2018:2162",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"name": "RHSA-2018:2161",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"name": "RHSA-2018:2172",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"name": "RHSA-2018:2171",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"name": "RHSA-2018:2216",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"name": "RHSA-2018:2228",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"name": "RHSA-2018:2250",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"name": "RHSA-2018:2246",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"name": "RHSA-2018:2258",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"name": "RHSA-2018:2289",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"name": "RHSA-2018:2328",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"name": "RHSA-2018:2309",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"name": "RHSA-2018:2364",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"name": "RHSA-2018:2363",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"name": "RHSA-2018:2396",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"name": "RHSA-2018:2394",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"name": "RHSA-2018:2387",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"name": "DSA-4273",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"name": "USN-3756-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"name": "USN-3777-3",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"name": "RHSA-2018:3425",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"name": "RHSA-2018:3424",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"name": "RHSA-2018:3423",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"name": "RHSA-2018:3407",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"name": "RHSA-2018:3402",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"name": "RHSA-2018:3401",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"name": "RHSA-2018:3400",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"name": "RHSA-2018:3399",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"name": "RHSA-2018:3398",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"name": "RHSA-2018:3397",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"name": "RHSA-2018:3396",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"name": "RHSA-2018:2948",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"name": "1042004",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "RHSA-2019:0148",
"refsource": "REDHAT",
"tags": [
"Broken Link"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"name": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"name": "RHSA-2019:1046",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"name": "openSUSE-SU-2019:1439",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"name": "openSUSE-SU-2019:1438",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
"refsource": "BUGTRAQ",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "openSUSE-SU-2020:1325",
"refsource": "SUSE",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-08-13T15:26Z",
"publishedDate": "2018-05-22T12:29Z"
}
}
}
CISCO-SA-20180521-CPUSIDECHANNEL
Vulnerability from csaf_cisco - Published: 2018-05-22 01:00 - Updated: 2018-08-31 20:24Notes
{
"document": {
"acknowledgments": [
{
"summary": "CVE ID CVE-2018-3639 was reported to Intel by Jann Horn of Google Project Zero (GPZ) and Ken Johnson of the Microsoft Security Response Center (MSRC).\r\n\r\nCVE ID CVE-2018-3640 was reported to Intel by Zdenek Sojka, Rudolf Marek, and Alex Zuepke from SYSGO AG."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "On May 21, 2018, researchers disclosed two vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks. These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged memory belonging to other processes.\r\n\r\nThe first vulnerability, CVE-2018-3639, is known as Spectre Variant 4 or SpectreNG. The second vulnerability, CVE-2018-3640, is known as Spectre Variant 3a. Both of these attacks are variants of the attacks disclosed in January 2018 and leverage cache-timing attacks to infer any disclosed data.\r\n\r\nTo exploit either of these vulnerabilities, an attacker must be able to run crafted or script code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.\r\n\r\nA Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as operating system or hypervisor, is patched against the vulnerabilities in question.\r\n\r\nAlthough Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. Refer to the \u201cAffected Products\u201d section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.\r\n\r\nCisco will release software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel\"]",
"title": "Summary"
},
{
"category": "general",
"text": "Any product or service not listed in the \u201cVulnerable Products\u201d section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable are explained in the \u201cSummary\u201d section of this advisory.",
"title": "Affected Products"
},
{
"category": "general",
"text": "The following table lists Cisco products and cloud services that are affected by the vulnerabilities described in this advisory:\r\n Product Cisco Bug ID Fixed Release Availability Network Application, Service, and Acceleration Cisco Cloud Services Platform 2100 CSCvj63868 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj63868\"] Consult the Cisco bug ID for details Cisco Wide Area Application Services (WAAS) CSCvj59144 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59144\"] Update to v6.x (Available) Cisco vBond Orchestrator \u2014 18.2 (Available) Cisco vEdge 5000 \u2014 18.2 (Available) Cisco vEdge Cloud \u2014 18.2 (Available) Cisco vManage NMS \u2014\r\n Cisco vSmart Controller \u2014 18.2 (Available) Network Management and Provisioning Cisco Network Functions Virtualization Infrastructure Software CSCvj59161 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59161\"] Consult the Cisco bug ID for details Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco 800 Series Industrial Integrated Services Routers CSCvj59153 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59153\"] Consult the Cisco bug ID for details Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco ASR 9000 XR 64-bit Series Routers CSCvj59142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142\"] Consult the Cisco bug ID for details Cisco Application Policy Infrastructure Controller (APIC) CSCvj59131 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59131\"] Consult the Cisco bug ID for details Cisco CGR 1000 Compute Module (IOx feature) CSCvj59160 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59160\"] Consult the Cisco bug ID for details Cisco Catalyst 9300 Series Switches - IOx feature CSCvj59156 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59156\"] Consult the Cisco bug ID for details Cisco Catalyst 9400 Series Switches - IOx feature CSCvj59157 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59157\"] Consult the Cisco bug ID for details Cisco Catalyst 9500 Series Switches - IOx feature CSCvj59158 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59158\"] Consult the Cisco bug ID for details Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] Consult the Cisco bug ID for details Cisco NCS 1000 Series Routers CSCvj59142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142\"] Consult the Cisco bug ID for details Cisco NCS 5000 Series Routers CSCvj59142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142\"] Consult the Cisco bug ID for details Cisco NCS 5500 Series Routers CSCvj59142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142\"] Consult the Cisco bug ID for details Cisco Nexus 3000 Series Switches CSCvj59136 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59136\"] Consult the Cisco bug ID for details Cisco Nexus 5000 Series Switches (OAC feature) CSCvj59138 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59138\"] Consult the Cisco bug ID for details Cisco Nexus 6000 Series Switches (OAC feature) CSCvj59135 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59135\"] Consult the Cisco bug ID for details Cisco Nexus 7000 Series Switches (OAC feature, Feature Bash) CSCvj59135 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59135\"] Consult the Cisco bug ID for details Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode CSCvj59136 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59136\"] Consult the Cisco bug ID for details Cisco Virtual Application Policy Infrastructure Controller (APIC) CSCvj59131 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59131\"] Consult the Cisco bug ID for details Cisco XRv 9000 Series Routers CSCvj59142 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142\"] Consult the Cisco bug ID for details Unified Computing Cisco C880 M4 Server CSCvj59127 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59127\"] Consult the Cisco bug ID for details Cisco C880 M5 Server CSCvj59127 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59127\"] Consult the Cisco bug ID for details Cisco Enterprise Network Compute System 5100 Series Servers CSCvj59121 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121\"] Consult the Cisco bug ID for details Cisco Enterprise Network Compute System 5400 Series Servers CSCvj59121 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121\"] Consult the Cisco bug ID for details Cisco HyperFlex with VMWare Hypervisor CSCvj59134 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59134\"] Consult the Cisco bug ID for details Cisco UCS B-Series M2 Blade Servers - Managed CSCvj59301 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59301\"] Cisco UCS B-Series M2 Blade Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M2 Rack Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\n Cisco UCS B-Series M3 Blade Servers CSCvj54880 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54880\"] UCS Manager 2.2(8l) (Available)\r\nUCS Manager 3.1(3j) (Available)\r\nUCS Manager 3.2(3g) (Available)\r\n Cisco UCS B-Series M4 Blade Servers (except B260, B460) CSCvj54187 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187\"] UCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available) Cisco UCS B-Series M5 Blade Servers CSCvj59266 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59266\"] Cisco UCS B-Series M5 Blade Servers\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M5 Rack Servers -Standalone\r\nCisco IMC 3.1(2i) - (Available) Cisco UCS B260 M4 Blade Server CSCvj54847 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847\"] Cisco UCS B260 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS B460 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) \u2013 Available\r\nUCS Manager 2.2(8l) - Available\r\nCisco UCS C460 M4 Rack Server - Managed\r\nUCS Manager 3.2(3e) \u2013 (Available)\r\nUCS Manager 3.1(3j) \u2013 (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\n Cisco UCS B460 M4 Blade Server CSCvj54847 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847\"] Cisco UCS B260 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS B460 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) \u2013 Available\r\nUCS Manager 2.2(8l) - Available\r\nCisco UCS C460 M4 Rack Server - Managed\r\nUCS Manager 3.2(3e) \u2013 (Available)\r\nUCS Manager 3.1(3j) \u2013 (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\n Cisco UCS C-Series M2 Rack Servers - Managed CSCvj59301 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59301\"] Cisco UCS B-Series M2 Blade Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M2 Rack Servers - Managed\r\nUCS Manager 2.2(8l) - (Available)\r\n Cisco UCS C-Series M2 Rack Servers - Standalone CSCvj59309 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59309\"] Cisco IMC 1.4(3z09) - (Available) Cisco UCS C-Series M2 Rack Servers [EX processor family servers] - Standalone CSCvj59304 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59304\"] Cisco IMC 1.5(9f) - (Available) Cisco UCS C-Series M3 Rack Servers CSCvj59312 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59312\"] UCS Manager 3.2(3g) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco IMC 3.0(4i) - (Available)\r\nCisco IMC 2.0(9o) - (Available)\r\n Cisco UCS C-Series M4 Rack Servers (except C460) - Standalone 1 CSCvj59318 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59318\"] Cisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(10k) - (Available) Cisco UCS C-Series M4 Rack Servers (except C460) -Managed 1 CSCvj54187 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187\"] UCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available) Cisco UCS C-Series M5 Rack Servers - Managed 1 CSCvj59331 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59331\"] UCS Manager 3.2(3g) - (Available) Cisco UCS C-Series M5 Rack Servers -Standalone 1 CSCvj59266 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59266\"] Cisco UCS B-Series M5 Blade Servers\r\nUCS Manager 3.2(3g) - (Available)\r\nCisco UCS C-Series M5 Rack Servers -Standalone\r\nCisco IMC 3.1(2i) - (Available) Cisco UCS C460 M4 Rack Server - Managed CSCvj54847 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847\"] Cisco UCS B260 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS B460 M4 Blade Server\r\nUCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) \u2013 Available\r\nUCS Manager 2.2(8l) - Available\r\nCisco UCS C460 M4 Rack Server - Managed\r\nUCS Manager 3.2(3e) \u2013 (Available)\r\nUCS Manager 3.1(3j) \u2013 (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\n Cisco UCS C460 M4 Rack Server - Standalone CSCvj59326 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59326\"] Cisco IMC 3.0(4e) - (Available)\r\nCisco IMC 2.0(12h) - (Available) Cisco UCS E-Series M2 Servers CSCvj59121 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121\"] Consult the Cisco bug ID for details Cisco UCS E-Series M3 Servers CSCvj59121 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121\"] Consult the Cisco bug ID for details Cisco UCS S3260 M4 Storage Server CSCvj54187 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187\"] UCS Manager 3.2(3e) - (Available)\r\nUCS Manager 3.1(3j) - (Available)\r\nUCS Manager 2.2(8l) - (Available)\r\nCisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available)\r\nCisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available) Cisco Virtual Infrastructure Manager CSCvj75271 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj75271\"] 2.4.1\r\n2.2.24\r\n(Available) Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvj59167 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59167\"] Consult the Cisco bug ID for details Cisco Cloud Hosted Services Cisco Metacloud CSCvj59149 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59149\"] Consult the Cisco bug ID for details Cisco Threat Grid \u2014\r\n\r\n\r\n1 Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "The following Cisco products are considered not vulnerable to Spectre Variant 3a or Spectre Variant 4. Specific models in these product families may be affected and will be explicitly listed in the preceding \u201cVulnerable Products\u201d section.\r\n Routers\r\nBranch Routers\r\n\r\nCisco 4000 Series Integrated Services Routers\r\n Cisco 1900 Series Integrated Services Routers\r\n Cisco 1800 Series Integrated Services Routers\r\n Cisco 1000 Series Integrated Services Routers\r\n Cisco 800 Series Routers\r\n\r\nData Center Interconnect Platforms\r\n\r\nCisco ASR 1000 Series Aggregation Services Routers\r\n Cisco Carrier Routing System\r\n Cisco Catalyst 6500 Series Switches\r\n\r\nIndustrial Routers\r\n\r\nCisco 2000 Series Connected Grid Routers\r\n Cisco 1000 Series Connected Grid Routers\r\n Cisco 900 Series Industrial Routers\r\n Cisco 800 Series Industrial Integrated Services Routers\r\n Cisco 500 Series WPAN Industrial Routers\r\n Cisco Wireless Gateway for LoRaWAN\r\n\r\nCloud Networking Services\r\n\r\nCisco Cloud Services Router 1000V Series\r\n\r\nMobile Internet Routers\r\n\r\nCisco 5900 Series Embedded Services Routers\r\nCisco MWR 2900 Series Mobile Wireless Routers\r\n\r\nService Provider Core Routers\r\n\r\nCisco Carrier Routing System\r\n Cisco Network Convergence System 6000 Series Routers\r\n\r\nService Provider Edge Routers\r\n\r\nCisco 12000 Series Routers\r\n Cisco ASR 1000 Series Aggregation Services Routers\r\n Cisco ASR 920 Series Aggregation Services Router\r\n Cisco ASR 901 Series Aggregation Services Routers\r\n Cisco ASR 900 Series Aggregation Services Routers\r\n Cisco XR 12000 Series Router\r\n Cisco Network Convergence System 500 Series Routers\r\n\r\nSmall Business Routers\r\n\r\nCisco 1900 Series Integrated Services Routers\r\n Cisco 800 Series Routers\r\n Cisco Small Business RV Series Routers\r\n\r\nVirtual Routers\r\n\r\nCisco Cloud Services Router 1000V Series\r\n Cisco WAN Aggregation and Internet Edge Routers\r\n Cisco ASR 1000 Series Aggregation Services Routers\r\n Cisco Catalyst 6500 Series Switches\r\n\r\nWAN Optimization\r\n\r\nCisco Virtual Wide Area Application Services (vWAAS)\r\nCisco Wide Area Application Services (WAAS) Express\r\nCisco Wide Area Application Services (WAAS) Software\r\n Switches\r\nBlade Switches\r\n\r\nCisco Blade Switches for Dell\r\n Cisco Blade Switches for FSC\r\n Cisco Blade Switches for HP\r\n Cisco Nexus 4000 Series Switches\r\n Cisco Switch Modules for IBM\r\n Cisco SFS Solutions for Blade Switches\r\n Cisco SFS Solution for Dell\r\n\r\nCampus LAN Switches - Access\r\n\r\n Cisco Catalyst 9400 Series Switches\r\n Cisco Catalyst 9300 Series Switches\r\n Cisco Catalyst 4500 Series Switches\r\n Cisco Catalyst 3850 Series Switches\r\n Cisco Catalyst 3750 Series Switches\r\n Cisco Catalyst 3650 Series Switches\r\n Cisco Catalyst 2960-L Series Switches\r\n Cisco Catalyst 2960-Plus Series Switches\r\n Cisco Catalyst 2960-X Series Switches\r\n Cisco Edge Series\r\n Cisco Meraki Cloud Managed Switches\r\n Cisco Redundant Power Systems\r\n\r\nCampus LAN Switches - Core and Distribution\r\n\r\n Cisco Catalyst 9500 Series Switches\r\nCisco Catalyst 6800 Series Switches\r\nCisco Catalyst 6500 Series Switches\r\nCisco Catalyst 6500 Virtual Switching System 1440\r\nCisco Catalyst 4900 Series Switches\r\nCisco Catalyst 4500 Series Switches\r\nCisco Catalyst 4500-X Series Switches\r\nCisco Catalyst 3850 Series Switches\r\nCisco Nexus 7000 Series Switches\r\n\r\n Campus LAN Switches - Digital Building\r\n\r\n Cisco Catalyst 3560-CX Series Switches\r\n Cisco Catalyst 2960-C Series Switches\r\n Cisco Catalyst 2960-CX Series Switches\r\n Cisco Catalyst 2960-L Series Switches\r\n Cisco Catalyst Digital Building Series Switches\r\n\r\nData Center Switches\r\n\r\n Cisco Nexus 2000 Series Fabric Extenders\r\n Cisco R Series Racks\r\n Cisco RP Series Power Distribution Units\r\n Cisco Data Center Network Management\r\n Cisco Data Center Network Manager\r\n Cisco Fabric Manager\r\n Cisco Data Center Switches with Cisco IOS Software\r\n Cisco Catalyst 6500 Series Switches\r\n Cisco Catalyst 4900 Series Switches\r\n Cisco Energy and Asset Management\r\n Cisco Asset Management Suite\r\n Cisco Energy Management Suite\r\n\r\nIndustrial Ethernet Switches\r\n\r\n Cisco 2500 Series Connected Grid Switches\r\n Cisco Embedded Service 2020 Series Switches\r\n Cisco Industrial Ethernet 5000 Series Switches\r\n Cisco Industrial Ethernet 4010 Series Switches\r\n Cisco Industrial Ethernet 4000 Series Switches\r\n Cisco Industrial Ethernet 3010 Series Switches\r\n Cisco Industrial Ethernet 3000 Series Switches\r\n Cisco Industrial Ethernet 2000 Series Switches\r\n Cisco Industrial Ethernet 2000U Series Switches\r\n Cisco Industrial Ethernet 1000 Series Switches\r\n\r\nInfiniBand Switches\r\n\r\n Cisco SFS 7000 Series InfiniBand Server Switches\r\n Cisco SFS 3500 Series Multifabric Server Switches\r\n Cisco SFS 3000 Series Multifabric Server Switches\r\n\r\n LAN Switches - Small Business\r\n\r\n Cisco 550X Series Stackable Managed Switches\r\n Cisco 350 Series Managed Switches\r\n Cisco 350X Series Stackable Managed Switches\r\n Cisco 250 Series Smart Switches\r\n Cisco 220 Series Smart Switches\r\n Cisco ESW2 Series Advanced Switches\r\n Cisco Small Business 300 Series Managed Switches\r\n Cisco Small Business 200 Series Smart Switches\r\n Cisco Small Business 110 Series Unmanaged Switches\r\n Cisco Small Business Smart Switches\r\n Cisco Small Business Stackable Managed Switches\r\n Cisco Small Business Unmanaged Switches\r\n\r\nService Provider Switches - Aggregation\r\n\r\n Cisco Catalyst 6500 Series Switches\r\n Cisco Catalyst 4500 Series Switches\r\n Cisco ME 4900 Series Ethernet Switches\r\n Cisco ME 3800X Series Carrier Ethernet Switch Routers\r\n\r\nService Provider Switches - Ethernet Access\r\n\r\n Cisco Catalyst 3750 Metro Series Switches\r\n Cisco ME 3600X Series Ethernet Access Switches\r\n Cisco ME 3400 Series Ethernet Access Switches\r\n Cisco ME 3400E Series Ethernet Access Switches\r\n Cisco ME 1200 Series Carrier Ethernet Access Devices\r\n Cisco Small Business Gigabit SP Switches\r\n\r\nVirtual Networking\r\n\r\n Cisco Application Centric Infrastructure Virtual Edge\r\n Cisco Application Virtual Switch\r\n Cisco Cloud Services Platform 2100\r\n Cisco Nexus 1000V InterCloud\r\n Cisco Nexus 1000V Switch for KVM\r\n Cisco Nexus 1000V Switch for Microsoft Hyper-V\r\n Cisco Nexus 1000V Switch for VMware vSphere\r\n\r\nCloud Networking Services\r\n\r\nCisco Prime Virtual Network Analysis Module (vNAM)\r\n Cisco Virtual Security Gateway\r\n Cisco Virtual Wide Area Application Services (vWAAS)\r\n\r\nWAN Switches\r\n\r\n Cisco IGX 8400 Series Switches\r\n\r\nMGX Switches\r\n\r\n Cisco MGX 8900 Series Switches\r\nCisco MGX 8850 Software\r\nCisco MGX 8800 Series Switches\r\nCisco MGX 8250 Software\r\nCisco MGX 8200 Series Edge Concentrators\r\n Wireless\r\nIndoor Access Points\r\n\r\nCisco Aironet 1815 Series Access Points\r\n Cisco Aironet 2800 Series Access Points\r\n Cisco Aironet 3800 Series Access Points\r\n Cisco Aironet 4800 Access Point\r\n\r\nOutdoor and Industrial Access Points\r\n\r\nCisco Aironet 1540 Series Access Points\r\n Cisco Aironet 1560 Series Access Points\r\n Cisco Aironet 1570 Series Access Points\r\n\r\nWireless LAN Controllers\r\n\r\nCisco 3504 Wireless LAN Controller\r\nCisco 5520 Wireless LAN Controller\r\nCisco 8540 Wireless LAN Controller\r\nCisco Virtual Wireless Controller\r\nCisco Meraki Cloud Managed Access Points\r\n Security\r\nCisco Cloud-Hosted Products\r\n\r\nCisco AMP family of products and endpoint protection clients\r\nCisco Cloud Security\r\nCisco Cloudlock\r\nCisco Umbrella\r\n\r\nEmail Security\r\n\r\nCisco Content Security Management Appliance\r\nCisco Email Security\r\nCisco Email Encryption\r\nCisco Email Encryption\r\nCisco Registered Envelope Service\r\n\r\nFirewalls\r\n\r\nCisco 3000 Series Industrial Security Appliances (ISA)\r\nCisco Meraki Cloud Managed Security Appliances\r\nCisco Adaptive Security Appliances (ASA)\r\nCisco Adaptive Security Virtual Appliance (ASAv)\r\n\r\nFirewall Management\r\n\r\nCisco Adaptive Security Device Manager\r\n Cisco Firepower Device Manager\r\n Cisco Firepower Management Center\r\n Cisco Security Manager\r\n Next-Generation Firewalls (NGFW)\r\nCisco ASA 5500-X with FirePOWER Services\r\n Cisco Firepower 9000 Series\r\n Cisco Firepower 4100 Series\r\n Cisco Firepower 2100 Series\r\n\r\nNetwork Security\r\n\r\nCisco VPN Internal Service Module for ISR G2\r\n\r\nNetwork Visibility and Segmentation\r\n\r\nCisco ISE Passive Identity Connector\r\n Cisco Identity Services Engine (ISE)\r\n Cisco Security Packet Analyzer\r\n Cisco Stealthwatch Cloud\r\n Cisco Stealthwatch Enterprise\r\n\r\nNext-Generation Intrusion Prevention System (NGIPS)\r\n\r\nCisco FirePOWER 8000 Series Appliances\r\n Cisco FirePOWER 7000 Series Appliances\r\n\r\nSecurity Management\r\n\r\nCisco Firepower Management Center\r\nCisco Adaptive Security Device Manager\r\nCisco Content Security Management Appliance\r\nCisco Defense Orchestrator\r\n Unified Communications\r\nCisco Spark\r\nCisco Unified Communications Manager\r\nCisco Business Edition 6000 - 100x80\r\nCisco Business Edition 6000\r\nCisco Jabber - 100x80\r\nCisco Jabber\r\nCisco Expressway\r\n Customer Care\r\nCisco Unified Contact Center Express\r\nCisco Unified Contact Center Enterprise\r\nCisco Finesse\r\nCisco MediaSense\r\n Conferencing\r\nCisco Meeting Server\r\nCisco WebEx Meeting Center\r\n Cisco WebEx Meetings Server\r\n Cisco TelePresence Management Suite\r\n Cisco TelePresence Server\r\n Cisco TelePresence Conductor\r\n Collaboration Endpoints\r\nCisco 8800 Series IP Phones\r\nCisco 7800 Series IP Phones\r\nCisco 6900 Series IP Phones\r\nCisco 3900 Series SIP Phones\r\nCisco Desktop Collaboration Experience - DX600 Series\r\nCisco DX Series\r\nCisco TelePresence SX10 Quick Set\r\nCisco TelePresence MX Series - 100x80\r\nCisco TelePresence MX Series\r\nCisco TelePresence IX5000 Series\r\n Cisco Unified Computing Management Platforms\r\nCisco Intersight\r\nCisco UCS Manager\r\nCisco UCS Central\r\nCisco UCS Director\r\nCisco UCS Performance Manager\r\n IP Video\r\nCisco Access Edge\r\nCisco Cable Modem Termination Systems (CMTSs)\r\nCisco RF Switches\r\nCisco cBR Series Converged Broadband Routers\r\nCisco uBR10000 Series Universal Broadband Routers\r\nCisco uBR7225VXR Universal Broadband Routers\r\nCisco uBR7200 Series Universal Broadband Routers\r\n\r\nNo other Cisco IP Video products are known to be affected.\r\n Internet of Things (IoT)\r\nCisco Jasper Control Center\r\nCisco IoT Management\r\nCisco Application Enablement\r\nCisco IoT Security\r\nCisco Kinetic\r\nCisco Extended Enterprise\r\nProducts Considered Not Vulnerable After Investigation\r\nCisco has investigated the following products, and they are not considered to be affected by the vulnerabilities that are described in this advisory:\r\n Network Application, Service, and Acceleration\r\n\r\nCisco 500 Series WPAN Industrial Routers (IOx feature)\r\nCisco DNA Center\r\nNetwork and Content Security Devices\r\n\r\nCisco Umbrella Virtual Appliance\r\nNetwork Management and Provisioning\r\n\r\nCisco Evolved Programmable Network Manager\r\nCisco Meeting Server\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nCisco 1000 Series Connected Grid Routers\r\nCisco Catalyst 3650 Series Switches - IOx feature\r\nCisco Industrial Ethernet 4000 Series Switches (IOx feature)\r\nCisco Nexus 4000 Series Blade Switches\r\nCisco Nexus 9000 Series Fabric Switches - ACI mode\r\nCisco c800 Series Integrated Services Routers\r\nWireless\r\n\r\nCisco Wireless Gateway for LoRaWAN\r\nCisco Cloud Hosted Services\r\n\r\nCisco Cloudlock\r\nCisco Hosted Collaboration Solution (HCS) for Government\r\nCisco Spark\r\nCisco Umbrella\r\nCisco WebEx Centers - Meeting Center, Training Center, Event Center, Support Center",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "Modern CPU Speculative Store Bypass Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can be triggered by causing the CPU to attempt to perform a speculative memory read before currently queued memory writes are completed. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on the cache of the targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\n This vulnerability has been assigned the following CVE ID: CVE-2018-3639\r\n\r\n Modern CPU Rogue System Register Read Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can by triggered by causing an affected platform to perform speculative reads of system registers. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on the cache of the targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2018-3640",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "For information about fixed software releases, consult the Cisco bug ID(s) at the top of this advisory.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "CVE ID CVE-2018-3639 was reported to Intel by Jann Horn of Google Project Zero (GPZ) and Ken Johnson of the Microsoft Security Response Center (MSRC).\r\n\r\nCVE ID CVE-2018-3640 was reported to Intel by Zdenek Sojka, Rudolf Marek, and Alex Zuepke from SYSGO AG.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"category": "external",
"summary": "CSCvj63868",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj63868"
},
{
"category": "external",
"summary": "CSCvj59144",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59144"
},
{
"category": "external",
"summary": "CSCvj59161",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59161"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59153",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59153"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142"
},
{
"category": "external",
"summary": "CSCvj59131",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59131"
},
{
"category": "external",
"summary": "CSCvj59160",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59160"
},
{
"category": "external",
"summary": "CSCvj59156",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59156"
},
{
"category": "external",
"summary": "CSCvj59157",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59157"
},
{
"category": "external",
"summary": "CSCvj59158",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59158"
},
{
"category": "external",
"summary": "CSCvj59152",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152"
},
{
"category": "external",
"summary": "CSCvj59142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142"
},
{
"category": "external",
"summary": "CSCvj59142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142"
},
{
"category": "external",
"summary": "CSCvj59142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142"
},
{
"category": "external",
"summary": "CSCvj59136",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59136"
},
{
"category": "external",
"summary": "CSCvj59138",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59138"
},
{
"category": "external",
"summary": "CSCvj59135",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59135"
},
{
"category": "external",
"summary": "CSCvj59135",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59135"
},
{
"category": "external",
"summary": "CSCvj59136",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59136"
},
{
"category": "external",
"summary": "CSCvj59131",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59131"
},
{
"category": "external",
"summary": "CSCvj59142",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59142"
},
{
"category": "external",
"summary": "CSCvj59127",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59127"
},
{
"category": "external",
"summary": "CSCvj59127",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59127"
},
{
"category": "external",
"summary": "CSCvj59121",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121"
},
{
"category": "external",
"summary": "CSCvj59121",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121"
},
{
"category": "external",
"summary": "CSCvj59134",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59134"
},
{
"category": "external",
"summary": "CSCvj59301",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59301"
},
{
"category": "external",
"summary": "CSCvj54880",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54880"
},
{
"category": "external",
"summary": "CSCvj54187",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187"
},
{
"category": "external",
"summary": "CSCvj59266",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59266"
},
{
"category": "external",
"summary": "CSCvj54847",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847"
},
{
"category": "external",
"summary": "CSCvj54847",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847"
},
{
"category": "external",
"summary": "CSCvj59301",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59301"
},
{
"category": "external",
"summary": "CSCvj59309",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59309"
},
{
"category": "external",
"summary": "CSCvj59304",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59304"
},
{
"category": "external",
"summary": "CSCvj59312",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59312"
},
{
"category": "external",
"summary": "CSCvj59318",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59318"
},
{
"category": "external",
"summary": "CSCvj54187",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187"
},
{
"category": "external",
"summary": "CSCvj59331",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59331"
},
{
"category": "external",
"summary": "CSCvj59266",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59266"
},
{
"category": "external",
"summary": "CSCvj54847",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54847"
},
{
"category": "external",
"summary": "CSCvj59326",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59326"
},
{
"category": "external",
"summary": "CSCvj59121",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121"
},
{
"category": "external",
"summary": "CSCvj59121",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59121"
},
{
"category": "external",
"summary": "CSCvj54187",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj54187"
},
{
"category": "external",
"summary": "CSCvj75271",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj75271"
},
{
"category": "external",
"summary": "CSCvj59167",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59167"
},
{
"category": "external",
"summary": "CSCvj59149",
"url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59149"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "CPU Side-Channel Information Disclosure Vulnerabilities: May 2018",
"tracking": {
"current_release_date": "2018-08-31T20:24:00+00:00",
"generator": {
"date": "2022-09-03T03:33:52+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-20180521-cpusidechannel",
"initial_release_date": "2018-05-22T01:00:00+00:00",
"revision_history": [
{
"date": "2018-05-22T01:12:23+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2018-05-22T20:56:18+00:00",
"number": "1.1.0",
"summary": "In the Affected Products section, multiple products were moved from Under Investigation to Vulnerable or Confirmed Not Vulnerable"
},
{
"date": "2018-05-23T21:39:25+00:00",
"number": "1.2.0",
"summary": "In the Affected Products section, multiple products were moved from Under Investigation to Vulnerable."
},
{
"date": "2018-05-24T20:27:18+00:00",
"number": "1.3.0",
"summary": "In the Affected Products section, moved Cisco Evolved Programmable Network Manager from Under Investigation to Products Confirmed Not Vulnerable."
},
{
"date": "2018-05-29T18:25:51+00:00",
"number": "1.4.0",
"summary": "In the Affected Products section, multiple products were moved from Under Investigation to Vulnerable."
},
{
"date": "2018-05-31T20:44:16+00:00",
"number": "1.5.0",
"summary": "In the Affected Products section, multiple products were moved from Under Investigation to Vulnerable. Cisco DNA Center was added to Under Investigation."
},
{
"date": "2018-06-01T19:16:23+00:00",
"number": "1.6.0",
"summary": "In the Affected Products section, moved Cisco 880 M2 and M3 Servers to the Vulnerable Products section. Fix status information has been updated for multiple products."
},
{
"date": "2018-06-05T18:00:38+00:00",
"number": "1.7.0",
"summary": "Updated information about the status of fixes for multiple products listed in the Affected Products table."
},
{
"date": "2018-06-08T19:09:39+00:00",
"number": "1.8.0",
"summary": "Updated information about the status of fixes for multiple products listed in the Affected Products table."
},
{
"date": "2018-06-13T18:34:15+00:00",
"number": "1.9.0",
"summary": "Updated Products Under Investigation, Vulnerable Products, and Confirmed Not Vulnerable."
},
{
"date": "2018-06-22T18:20:49+00:00",
"number": "1.10.0",
"summary": "Updated Products Under Investigation, Vulnerable Products, and Confirmed Not Vulnerable."
},
{
"date": "2018-06-27T20:33:38+00:00",
"number": "1.11.0",
"summary": "Updated information about the status of fixes for multiple products listed in the Vulnerable Products table."
},
{
"date": "2018-07-06T21:09:53+00:00",
"number": "1.12.0",
"summary": "Updated Products Under Investigation, Vulnerable Products, and Confirmed Not Vulnerable."
},
{
"date": "2018-07-26T19:24:48+00:00",
"number": "1.13.0",
"summary": "Updated Products Under Investigation, Vulnerable Products, and Confirmed Not Vulnerable."
},
{
"date": "2018-08-07T20:21:32+00:00",
"number": "1.14.0",
"summary": "Updated information about the status of fixes for multiple products listed in the Vulnerable Products table. Removed references to ongoing investigation."
},
{
"date": "2018-08-31T20:24:48+00:00",
"number": "1.15.0",
"summary": "Updated fixed software information for UCS M2 Rack Servers; added Cisco Hosted Collaboration Solution for Government to the Confirmed Not Vulnerable section"
}
],
"status": "interim",
"version": "1.15.0"
}
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2018-05-22T01:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Modern CPU Speculative Store Bypass Information Disclosure Vulnerability"
},
{
"cve": "CVE-2018-3640",
"notes": [
{
"category": "general",
"text": "No additional information for this vulneraiblity is currently avaialbe.",
"title": "No Notes"
}
],
"release_date": "2018-05-22T01:00:00+00:00",
"remediations": [
{
"category": "none_available",
"details": "No remediation is available at this time."
}
],
"title": "Modern CPU Rogue System Register Read Information Disclosure Vulnerability"
}
]
}
CERTFR-2018-ALE-001
Vulnerability from certfr_alerte - Published: 2018-01-04 - Updated: 2018-10-10
[Mise à jour du 25/05/2018 : ajout de bulletins Microsoft (cf. section Documentation)]
[Mise à jour du 22/05/2018 : publications de nouvelles variantes]
[Mise à jour du 23/02/2018 : annonce d'Intel sur la sortie des mises à jour des micrologiciels (cf. section Solution)]
[Mise à jour du 12/02/2018 : ajout des bulletins de sécurité VMware, RedHat et SUSE (cf. section Solution)]
[Mise à jour du 23/01/2018 : modification des recommandations suite au communiqué d'Intel (cf. section Solution)]
Le 4 janvier 2018, deux vulnérabilités affectant plusieurs familles de processeurs et pouvant conduire à des fuites d'informations ont été rendues publiques [1][2]. Intitulées Spectre et Meltdown, ces deux vulnérabilités ont reçu les identifiants CVE-2017-5715, CVE-2017-5753 pour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux nouvelles vulnérabilités identifiées CVE-2018-3639 et CVE-2018-3640, reposant sur des principes similaires, ont également été publiées [42].
Vulnérabilité Meltdown
Les processeurs modernes intègrent plusieurs fonctionnalités visant à améliorer leurs performances. Parmi celles-ci, l'exécution dite out-of-order permet d'exécuter les instructions d'un programme en fonction de la disponibilité des ressources de calculs et plus nécessairement de façon séquentielle. Une faiblesse de ce mécanisme peut cependant conduire à l'exécution d'une instruction sans que le niveau de privilèges requis par celle-ci ne soit correctement vérifié. Bien que le résultat de l'exécution d'une telle instruction ne soit pas validé par la suite, il peut être possible de récupérer l'information en utilisant une attaque par canaux cachés.
La vulnérabilité CVE-2017-5754 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des zones mémoires propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à la mémoire du système d'exploitation. Cela peut conduire à des fuites de données sensibles présentes en mémoire et peut inclure des informations d'autres programmes ou encore des clés de chiffrement. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
La vulnérabilité CVE-2018-3640 exploite l’exécution out-of-order sur des instructions requérant un haut niveau de privilège pour permettre l'accès en lecture à des registres propres au système d’exploitation depuis du code s’exécutant de façon non-privilégiée. En particulier, l'exploitation de cette vulnérabilité permet d'accéder depuis un programme utilisateur à des paramètres de configuration du processeur. Cette fuite d'informations peut aussi être mise en œuvre pour faciliter la compromission d'un système.
Vulnérabilité Spectre
L'exécution spéculative est une seconde technique d'optimisation utilisée par les processeurs modernes. Les dépendances entre les instructions limitent les possibilités d'exécution out-of-order. Pour remédier à cette limitation, le processeur émet des hypothèses concernant les résultats non encore disponibles. Ceci lui permet de poursuivre l’exécution out-of-order en utilisant ces hypothèses en remplacement des résultats attendus. On parle alors d'exécution spéculative. Ces hypothèses sont vérifiées par le processeur dès que les résultats auxquels elles se rapportent deviennent disponibles. Si elles se révèlent correctes, le processeur valide l'exécution spéculative. Mais inversement, si elles se révèlent erronées, les effets de l'exécution spéculative doivent être annulés et l'exécution doit reprendre au point on les hypothèses erronées avaient été émises, c'est à dire là où l'exécution spéculative avait débutée.
Cependant les effets d'une exécution spéculative erronée sur le cache perdurent. Or, en mesurant des temps d'accès à des zones mémoires, il est possible de connaître l'état du cache. Par conséquent, un attaquant sera capable de déterminer les résultats intermédiaires d'une exécution spéculative erronée si ceux-ci influent sur l'état du cache. Cette utilisation du cache pour mener à bien l'exploitation est commune aux trois variantes de Spectre.
Variante 1 (CVE-2017-5753)
Le prédicteur de branches est un composant du processeur utilisé pour émettre des hypothèses concernant l'adresse de la prochaine instruction à exécuter. En particulier, il est utilisé pour prédire l'issue des sauts conditionnels. D'autre part, ce composant est partagé entre des codes s'exécutant dans des cloisonnements de sécurité différents (processus, niveaux de privilège).
Dans la variante 1 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut conditionnel s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée. Un code est vulnérable si cette exécution spéculative erronée modifie le cache de façon qui dépende d'une valeur secrète (c'est à dire non directement accessible depuis le cloisonnement dans lequel se situe l'attaquant).
Exemple de code vulnérable fourni dans l'article:
[pastacode lang="c" manual="if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20*%20256%5D%3B" message="" highlight="" provider="manual"/]
Un attaquant maîtrisant la valeur de x peut obtenir une lecture arbitraire dans l'espace d'adressage du processus exécutant le code ci-dessus. Pour cela, l'attaquant commence par soumettre un grand nombre de x valides (c'est à dire vérifiant la condition de la ligne 1) pour faire croire au prédicteur de branches que la condition ligne 1 est toujours vraie. Puis il soumet un x pointant à une adresse arbitraire. Le prédicteur de branches estime néanmoins que la condition est vraie, ce qui déclenche l'exécution spéculative de la ligne 2. La valeur secrète pointée par x est récupérée puis utilisée pour former l'adresse d'une seconde lecture mémoire. Cette seconde lecture aura un effet sur le cache décelable par l'attaquant qui sera alors en mesure de retrouver la valeur secrète.
Variante 2 (CVE-2017-5715)
Le prédicteur de branches est également utilisé pour prédire l'issue des sauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur les heuristiques du prédicteur de branches pour fausser la prédiction d'un saut indirect s’exécutant dans un autre cloisonnement de sécurité, ce qui a pour effet de déclencher une exécution spéculative erronée à une adresse arbitraire maîtrisée par l'attaquant. En choisissant correctement le code exécuté spéculativement, l'attaquant est alors capable d'obtenir une lecture arbitraire dans l'espace d'adressage du processus victime.
Variante 3 (CVE-2018-3639)
Les processeurs émettent également des hypothèses concernant l'adresse de certains accès mémoire. Pour bénéficier de plus de libertés dans l'ordre d'exécution d'opérations de lecture mémoire, le processeur va devoir prédire si celles-ci chevauchent des opérations d'écriture en attente d'exécution. Si une opération de lecture ne chevauche aucune opération d'écriture en attente d'exécution, rien ne s'oppose à qu'elle puisse être exécutée de façon anticipée.
Dans la variante 3 de Spectre, un attaquant influe sur les heuristiques du processeur utilisées pour la prédiction d'adresses, ce qui a pour effet de déclencher une exécution spéculative erronée d'une opération de lecture mémoire et des instructions qui en dépendent. Un code est vulnérable si cette exécution spéculative erronée manipule une valeur secrète et la laisse fuir à travers un état observable du cache
Microsoft (une des parties ayant découvert la vulnérabilité) [43] affirme ne pas avoir identifié de code vulnérable dans leurs produits, ce qui laisse penser que les codes vulnérables sont peu fréquents.
Impact
Les vulnérabilités décrites dans cette alerte peuvent impacter tous les systèmes utilisant un processeur vulnérable et donc de façon indépendante du système d'exploitation. Selon les chercheurs à l'origine de la découverte de ces failles, il est ainsi possible d'accéder à l'intégralité de la mémoire physique sur des systèmes Linux et OSX et à une part importante de la mémoire sur un système Windows.
On notera que l'impact peut être plus particulièrement important dans des systèmes de ressources partagés de type conteneur (Docker, LXC) où il serait possible depuis un environnement restreint d'accéder à toutes les données présentes sur la machine physique dans lequel s'exécute le conteneur ou encore dans des environnements virtualisés utilisant la para-virtualisation de type Xen.
Preuve de concept
Le CERT-FR constate que des preuves de concept fonctionnelles pour Meltdown sont désormais publiques. Les règles Yara suivantes servent à détecter les binaires liés à la bibliothèque publiée par l'Institute of Applied Information Processing and Communications (IAIK) :
[pastacode lang="c" manual="rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D" message="" highlight="" provider="manual"/]
Campagne de pourriels
Le CERT-FR constate qu'une campagne de pourriels visant à distribuer des logiciels malveillants a été lancée afin de profiter de la situation autour des vulnérabilité Spectre et Meltdown [32]. Des attaquants se faisant passer pour la Bundesamt für Sicherheit in der Informationstechnik (BSI), l'équivalent allemand de l'ANSSI, ont envoyé des courriers électroniques invitant leurs destinataires à se rendre sur une copie du site de la BSI. La différence avec le site officiel était une modification de l'alerte concernant les vulnérabilités: l'utilisateur était invité à installer un correctif qui se trouvait être un logiciel malveillant.
Le CERT-FR rappelle de faire preuve de la plus grande vigilance quand à l'ouverture des courriers électroniques ainsi que d'installer les correctifs de sécurité dans les plus brefs délais, et ce uniquement depuis les sources officielles des éditeurs.
Solution
Correctifs disponibles
Plusieurs éditeurs ont publiés des correctifs partiels pour les vulnérabilités Meltdown et Spectre. Le CERT-FR recommande l'application des correctifs disponibles dès que possible.
Apple
Apple indique dans une communication du 4 janvier 2017 que les systèmes iOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la vulnérabilité Meltdown [9].
Le 8 janvier 2018, Apple a publié des correctifs pour ses produits iOS, Safari et macOS High Sierra [26].
Mozilla
Mozilla a publié une communication annonçant que la version 57.0.4 de Firefox intègre deux correctifs de sécurité liés aux vulnérabilités décrites dans cette alerte [25].
Microsoft
Microsoft a annoncé dans un communiqué [10] que ses navigateurs Internet Explorer et Edge avaient bénéficié d'un correctif contre la vulnérabilité Spectre sur les systèmes Windows 10 et Windows Server 2016 [11][12]. Les correctifs de sécurité fournis par Microsoft sont néanmoins dépendants des logiciels anti-virus installés sur le système. Pour tous détails sur l'application de ces correctifs le CERT-FR recommande de se reporter au site de l'éditeur. Pour les systèmes 32 bits des versions antérieures à Windows 10 et Windows Server 2016, un correctif sera déployé à l'occasion de la mise à jour mensuelle, le 9 janvier 2018. Pour Windows Server, une simple mise à jour ne suffit par pour se prémunir du problème. Microsoft a publié une série de mesures à mettre en oeuvre pour se protéger [22]. Dans tous les cas, Microsoft conseille de mettre à jour le micrologiciel de son processeur lorsque des correctifs seront disponibles.
SUSE
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par SUSE [13].
Le 11 janvier 2018, SUSE a publié des correctifs pour le noyau Linux ainsi que pour le microgiciel Intel utilisés par ses produits [29][30].
Red Hat
Des correctifs pour les vulnérabilités Spectre et Meltdown ont été distribués par Red Hat [23].
Ubuntu
Le mardi 9 janvier 2018, Ubuntu a publié plusieurs bulletins de sécurité concernant des correctifs pour la vulnérabilité Meltdown [27]. Le 11 janvier 2018, Ubuntu a publié un bulletin de sécurité annonçant la mise à disposition d'un correctif pour le microgiciel Intel [31].
VMware
Des correctifs contre la vulnérabilité Spectre ont été apportés par VMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est à noter que les plateformes ESXi en version 5.5 reçoivent un correctif seulement pour la variante CVE-2017-5715 de Spectre [14].
Android
Dans leur bulletin de sécurité pour les correctifs du mois de janvier 2018 [16], Android annonce ne pas détenir d'informations sur une reproduction des vulnérabilités Spectre et Meltdown sur leurs appareils. Cependant, les correctifs disponibles pour ce mois de janvier 2018 intègrent des mesures permettant de limiter le risque de tels attaques [15].
Dans un communiqué sur l'état de ses produits face aux vulnérabilités Meltdown et Spectre, Google annonce que Chrome OS sous Intel profite de la fonctionnalité KPTI (correctif limitant les effets de la vulnérabilité Meltdown) pour les noyaux en versions 3.18 et 4.4 à partir de la version 63 du système d'exploitation [17].
Citrix
Dans un avis de sécurité daté du 4 janvier 2018 Citrix annonce apporter un correctif de sécurité pour les produits Citrix XenServer 7.1 LTSR CU1 [19].
Amazon AWS
Dans un communiqué du 4 janvier 2018 [20], Amazon indique que les instances disposant d'une configuration par défaut (Amazon Linux AMI) vont bénéficier d'une mise à jour du noyau Linux pour adresser les effets de la vulnérabilité CVE-2017-5754 (Meltdown) [21].
Debian
Le 10 janvier 2018, un bulletin de sécurité publié par Debian propose un correctif pour la vulnérabilité Meltdown [28].
Pour la semaine du 15 au 21 janvier 2018, les éditeurs suivants ont publiés des correctifs pour Meldown et Spectre:
- SUSE [33]
- Oracle [34] [35]
- Red Hat [36]
- Moxa [37] (l'éditeur annonce que d'autres correctifs sont à venir)
Le 22 janvier 2018, Intel a publié un communiqué [38] pour annoncer qu'ils avaient trouvé la cause des dysfonctionnements liés à leur correctif. Dans certains cas, le correctif apporté à leur microgiciel provoquait des redémarrages intempestifs. La situation n'est toutefois pas encore résolue. Intel conseille donc de retarder l'installation du correctif pour le microprocesseur.
Le CERT-FR rappelle qu'il est important d'installer les correctifs de sécurité dans les plus brefs délais. Concernant Spectre et Meldown, il est nécessaire de mettre à jour en priorité les navigateurs puis les systèmes d'exploitation. Toutefois, il est également important de tester ces correctifs dans des environnements contrôlés avant de les pousser en production. Concernant les microgiciels d'Intel, le CERT-FR recommande une prudence accrue dans leurs déploiements voir d'attendre la version finale de ces mises à jour. En matière de risques, l'exploitation de la vulnérabilité Spectre est particulièrement complexe et est la seule à être couverte par la mise à jour du micrologiciel.
Les 8 et 9 février 2018, plusieurs éditeurs ont publiés des correctifs supplémentaires:
- VMware [39]
- Red Hat [40]
- SUSE [41]
Le 20 février 2018, Intel a annoncé que les mises à jour de sécurité des micrologiciels pour certaines familles de processeurs étaient disponibles. Sont concernés les processeurs de type Kaby Lake, Coffee Lake ainsi que certains Skylake ( cf. https://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/). Intel a également mis à jour son calendrier prévisionnel des sorties futures (cf. https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf).
Les éditeurs suivants ont également publiés de nouveaux correctifs :
- Ubuntu (cf. )
- SUSE (cf. , et )
- Siemens (cf. )
Contournement provisoire
Dans leur article sur la vulnérabilité Meltdown, les auteurs de la publication indiquent que la fonctionnalité de sécurité KAISER [5] permet de limiter les implications dues à l'exploitation de Meltdown. Ce mécanisme a été intégré dans les dernières versions du noyau Linux sous le nom de Kernel page-table isolation (KPTI) [6] et est en cours d'intégration dans les versions précédentes du noyau.
Cette fonctionnalité renforce la séparation entre les zones mémoires accessibles en mode utilisateur et celles accessibles en mode noyau. De ce fait il n'est donc plus possible de d'accéder lors de l'utilisation de la vulnérabilité Meltdown aux informations noyau.
Systèmes de virtualisation
Les systèmes virtualisés de type Xen sont vulnérables aux failles présentés dans cette alerte. Concernant Meltdown un contournement pouvant être mis en œuvre est d'utiliser une virtualisation matérielle. En effet, d'après un avis de sécurité de l'éditeur [18], la CVE-2017-5754 n'affecte que les systèmes Xen en architecture Intel 64 bits utilisant la para-virtualisation.
D'une façon globale, l'ANSSI a émis un guide relatif à la virtualisation précisant que « les systèmes invités présents sur une même machine physique [doivent manipuler] des données qui ont une sensibilité similaire » [7].
Vérifications des correctifs disponibles
Windows
Microsoft a mis à disposition un script PowerShell qui permet de vérifier si un correctif pour les vulnérabilités a été appliqué sur un système Windows [4].
Linux
Afin de s'assurer de la présence du mécanisme de sécurité KPTI sur un système utilisant un noyau Linux il est possible d'exécuter la commande suivante :
[pastacode lang="bash" manual="dmesg%20%7C%20grep%20'Kernel%2FUser%20page%20tables%20isolation'" message="" highlight="" provider="manual"/]
Dans le cas où KPTI est activé un message sera affiché en sortie.
- Processeurs Intel
- La liste des processeurs vulnérables est fournie dans la section documentation.
- Processeurs AMD
- AMD est vulnérable à Spectre, mais pas à Meltdown.
- Processeurs ARM :
- ARM Cortex-R7
- ARM Cortex-R8
- ARM Cortex-A8
- ARM Cortex-A9
- ARM Cortex-A15
- ARM Cortex-A17
- ARM Cortex-A57
- ARM Cortex-A72
- ARM Cortex-A73
- ARM Cortex-A75
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eProcesseurs Intel \u003cul\u003e \u003cli\u003eLa liste des processeurs vuln\u00e9rables est fournie dans la section documentation.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs AMD \u003cul\u003e \u003cli\u003eAMD est vuln\u00e9rable \u00e0 Spectre, mais pas \u00e0 Meltdown.\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProcesseurs ARM : \u003cul\u003e \u003cli\u003eARM Cortex-R7\u003c/li\u003e \u003cli\u003eARM Cortex-R8\u003c/li\u003e \u003cli\u003eARM Cortex-A8\u003c/li\u003e \u003cli\u003eARM Cortex-A9\u003c/li\u003e \u003cli\u003eARM Cortex-A15\u003c/li\u003e \u003cli\u003eARM Cortex-A17\u003c/li\u003e \u003cli\u003eARM Cortex-A57\u003c/li\u003e \u003cli\u003eARM Cortex-A72\u003c/li\u003e \u003cli\u003eARM Cortex-A73\u003c/li\u003e \u003cli\u003eARM Cortex-A75\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003c/ul\u003e \u003cp\u003e\u0026nbsp;\u003c/p\u003e ",
"closed_at": "2018-10-10",
"content": "## Solution\n\n### Correctifs disponibles\n\nPlusieurs \u00e9diteurs ont publi\u00e9s des correctifs partiels pour les\nvuln\u00e9rabilit\u00e9s Meltdown et Spectre. Le CERT-FR recommande l\u0027application\ndes correctifs disponibles d\u00e8s que possible.\n\n#### Apple\n\nApple indique dans une communication du 4 janvier 2017 que les syst\u00e8mes\niOS 11.2, macOS 10.13.2 et tvOS 11.2 profitent de correctifs contre la\nvuln\u00e9rabilit\u00e9 Meltdown \\[9\\].\n\nLe 8 janvier 2018, Apple a publi\u00e9 des correctifs pour ses produits iOS,\nSafari et macOS High Sierra \\[26\\].\n\n#### Mozilla\n\nMozilla a publi\u00e9 une communication annon\u00e7ant que la version 57.0.4 de\nFirefox int\u00e8gre deux correctifs de s\u00e9curit\u00e9 li\u00e9s aux vuln\u00e9rabilit\u00e9s\nd\u00e9crites dans cette alerte \\[25\\].\n\n#### Microsoft\n\nMicrosoft a annonc\u00e9 dans un communiqu\u00e9 \\[10\\] que ses navigateurs\nInternet Explorer et Edge avaient b\u00e9n\u00e9fici\u00e9 d\u0027un correctif contre la\nvuln\u00e9rabilit\u00e9 Spectre sur les syst\u00e8mes Windows 10 et Windows Server 2016\n\\[11\\]\\[12\\]. Les correctifs de s\u00e9curit\u00e9 fournis par Microsoft sont\nn\u00e9anmoins d\u00e9pendants des logiciels anti-virus install\u00e9s sur le syst\u00e8me.\nPour tous d\u00e9tails sur l\u0027application de ces correctifs le CERT-FR\nrecommande de se reporter au site de l\u0027\u00e9diteur. Pour les syst\u00e8mes 32\nbits des versions ant\u00e9rieures \u00e0 Windows 10 et Windows Server 2016, un\ncorrectif sera d\u00e9ploy\u00e9 \u00e0 l\u0027occasion de la mise \u00e0 jour mensuelle, le 9\njanvier 2018. Pour Windows Server, une simple mise \u00e0 jour ne suffit par\npour se pr\u00e9munir du probl\u00e8me. Microsoft a publi\u00e9 une s\u00e9rie de mesures \u00e0\nmettre en oeuvre pour se prot\u00e9ger \\[22\\]. Dans tous les cas, Microsoft\nconseille de mettre \u00e0 jour le micrologiciel de son processeur lorsque\ndes correctifs seront disponibles.\n\n#### SUSE\n\nDes correctifs pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par SUSE \\[13\\].\n\nLe 11 janvier 2018, SUSE a publi\u00e9 des correctifs pour le noyau Linux\nainsi que pour le microgiciel Intel utilis\u00e9s par ses produits\n\\[29\\]\\[30\\].\n\n#### Red Hat\n\nDes correctifs\u00a0pour les vuln\u00e9rabilit\u00e9s Spectre et Meltdown ont \u00e9t\u00e9\ndistribu\u00e9s par Red Hat \\[23\\].\n\n#### Ubuntu\n\nLe mardi 9 janvier 2018, Ubuntu a publi\u00e9 plusieurs bulletins de s\u00e9curit\u00e9\nconcernant des correctifs pour la vuln\u00e9rabilit\u00e9 Meltdown \\[27\\]. Le 11\njanvier 2018, Ubuntu a publi\u00e9 un bulletin de s\u00e9curit\u00e9 annon\u00e7ant la mise\n\u00e0 disposition d\u0027un correctif pour le microgiciel Intel \\[31\\].\n\n#### VMware\n\nDes correctifs contre la vuln\u00e9rabilit\u00e9 Spectre ont \u00e9t\u00e9 apport\u00e9s par\nVMware pour leurs produits ESXi, Workstation et Fusion sous OS X. Il est\n\u00e0 noter que les plateformes ESXi en version 5.5 re\u00e7oivent un correctif\nseulement pour la variante CVE-2017-5715 de Spectre \\[14\\].\n\n#### Android\n\nDans leur bulletin de s\u00e9curit\u00e9 pour les correctifs du mois de janvier\n2018 \\[16\\], Android annonce ne pas d\u00e9tenir d\u0027informations sur une\nreproduction des vuln\u00e9rabilit\u00e9s Spectre et Meltdown sur leurs appareils.\nCependant, les correctifs disponibles pour ce mois de janvier 2018\nint\u00e8grent des mesures permettant de limiter le risque de tels attaques\n\\[15\\].\n\n#### Google\n\nDans un communiqu\u00e9 sur l\u0027\u00e9tat de ses produits face aux vuln\u00e9rabilit\u00e9s\nMeltdown et Spectre, Google annonce que Chrome OS sous Intel profite de\nla fonctionnalit\u00e9 KPTI (correctif limitant les effets de la\nvuln\u00e9rabilit\u00e9 Meltdown) pour les noyaux en versions 3.18 et 4.4 \u00e0 partir\nde la version 63 du syst\u00e8me d\u0027exploitation \\[17\\].\n\n#### Citrix\n\nDans un avis de s\u00e9curit\u00e9 dat\u00e9 du 4 janvier 2018 Citrix annonce apporter\nun correctif de s\u00e9curit\u00e9 pour les produits Citrix XenServer 7.1 LTSR CU1\n\\[19\\].\n\n#### Amazon AWS\n\nDans un communiqu\u00e9 du 4 janvier 2018 \\[20\\], Amazon indique que les\ninstances disposant d\u0027une configuration par d\u00e9faut (Amazon Linux AMI)\u00a0\nvont b\u00e9n\u00e9ficier d\u0027une mise \u00e0 jour du noyau Linux pour adresser les\neffets de la vuln\u00e9rabilit\u00e9 CVE-2017-5754 (Meltdown) \\[21\\].\n\n#### Debian\n\nLe 10 janvier 2018, un bulletin de s\u00e9curit\u00e9 publi\u00e9 par Debian propose un\ncorrectif pour la vuln\u00e9rabilit\u00e9 Meltdown \\[28\\].\n\n\u00a0\n\nPour la semaine du 15 au 21 janvier 2018, les \u00e9diteurs suivants ont\npubli\u00e9s des correctifs pour Meldown et Spectre:\n\n- SUSE \\[33\\]\n- Oracle \\[34\\] \\[35\\]\n- Red Hat \\[36\\]\n- Moxa \\[37\\] (l\u0027\u00e9diteur annonce que d\u0027autres correctifs sont \u00e0 venir)\n\n**Le 22 janvier 2018, Intel a publi\u00e9 un communiqu\u00e9 \\[38\\] pour annoncer\nqu\u0027ils avaient trouv\u00e9 la cause des dysfonctionnements li\u00e9s \u00e0 leur\ncorrectif. Dans certains cas, le correctif apport\u00e9 \u00e0 leur microgiciel\nprovoquait des red\u00e9marrages intempestifs. La situation n\u0027est toutefois\npas encore r\u00e9solue. Intel conseille donc de retarder l\u0027installation du\ncorrectif pour le microprocesseur.**\n\n**Le CERT-FR rappelle qu\u0027il est important d\u0027installer les correctifs de\ns\u00e9curit\u00e9 dans les plus brefs d\u00e9lais. Concernant Spectre et Meldown, il\nest n\u00e9cessaire de mettre \u00e0 jour en priorit\u00e9 les navigateurs puis les\nsyst\u00e8mes d\u0027exploitation.\u00a0Toutefois, il est \u00e9galement important de tester\nces correctifs dans des environnements contr\u00f4l\u00e9s avant de les pousser en\nproduction. Concernant les microgiciels d\u0027Intel, le CERT-FR\u00a0recommande\nune prudence accrue dans leurs d\u00e9ploiements voir d\u0027attendre la version\nfinale de ces mises \u00e0 jour. En mati\u00e8re de risques, l\u0027exploitation de la\nvuln\u00e9rabilit\u00e9 Spectre est particuli\u00e8rement\u00a0complexe et est la seule \u00e0\n\u00eatre couverte par la mise \u00e0 jour du micrologiciel.**\n\nLes 8 et 9 f\u00e9vrier 2018, plusieurs \u00e9diteurs ont publi\u00e9s des correctifs\nsuppl\u00e9mentaires:\n\n- VMware \\[39\\]\n- Red Hat \\[40\\]\n- SUSE \\[41\\]\n\nLe 20 f\u00e9vrier 2018, Intel a annonc\u00e9 que les mises \u00e0 jour de s\u00e9curit\u00e9 des\nmicrologiciels pour certaines familles de processeurs \u00e9taient\ndisponibles. Sont concern\u00e9s les processeurs de type Kaby Lake, Coffee\nLake ainsi que certains Skylake (\ncf.\u00a0\u003chttps://newsroom.intel.com/news/latest-intel-security-news-updated-firmware-available/\u003e).\nIntel a \u00e9galement mis \u00e0 jour son calendrier pr\u00e9visionnel des sorties\nfutures (cf.\n\u003chttps://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf\u003e).\n\nLes \u00e9diteurs suivants ont \u00e9galement publi\u00e9s de nouveaux correctifs :\n\n- Ubuntu\n (cf.\u00a0\u003c/avis/CERTFR-2018-AVI-094/\u003e)\n- SUSE (cf. \u003c/avis/CERTFR-2018-AVI-080/\u003e,\n \u003c/avis/CERTFR-2018-AVI-083/\u003e\u00a0et\n \u003c/avis/CERTFR-2018-AVI-091/\u003e)\n- Siemens (cf.\n \u003c/avis/CERTFR-2018-AVI-095/\u003e)\n\n\u00a0\n\n## Contournement provisoire\n\nDans leur article sur la vuln\u00e9rabilit\u00e9 Meltdown, les auteurs de la\npublication indiquent que la fonctionnalit\u00e9 de s\u00e9curit\u00e9 KAISER \\[5\\]\npermet de limiter les implications dues \u00e0 l\u0027exploitation de Meltdown.\u00a0Ce\nm\u00e9canisme a \u00e9t\u00e9 int\u00e9gr\u00e9 dans les derni\u00e8res versions du noyau Linux sous\nle nom de Kernel page-table isolation (KPTI) \\[6\\] et est en cours\nd\u0027int\u00e9gration dans les versions pr\u00e9c\u00e9dentes du noyau.\n\nCette fonctionnalit\u00e9 renforce la s\u00e9paration entre les zones m\u00e9moires\naccessibles en mode utilisateur et celles accessibles en mode noyau. De\nce fait il n\u0027est donc plus possible de d\u0027acc\u00e9der lors de l\u0027utilisation\nde la vuln\u00e9rabilit\u00e9 Meltdown aux informations noyau.\n\n### Syst\u00e8mes de virtualisation\n\nLes syst\u00e8mes virtualis\u00e9s de type Xen sont vuln\u00e9rables aux failles\npr\u00e9sent\u00e9s dans cette alerte. Concernant Meltdown un contournement\npouvant \u00eatre mis en \u0153uvre est d\u0027utiliser une virtualisation mat\u00e9rielle.\nEn effet, d\u0027apr\u00e8s un avis de s\u00e9curit\u00e9 de l\u0027\u00e9diteur \\[18\\], la\nCVE-2017-5754 n\u0027affecte que les syst\u00e8mes Xen en architecture Intel 64\nbits utilisant la para-virtualisation.\n\nD\u0027une fa\u00e7on globale, l\u0027ANSSI a \u00e9mis un guide relatif \u00e0 la virtualisation\npr\u00e9cisant que \u003cspan class=\"citation\"\u003e\u00ab\u003c/span\u003e les syst\u00e8mes invit\u00e9s\npr\u00e9sents sur une m\u00eame machine physique \\[doivent manipuler\\] des donn\u00e9es\nqui ont une \u003cspan class=\"highlight selected\"\u003esensibilit\u00e9\u003c/span\u003e\nsimilaire \u003cspan class=\"citation\"\u003e\u00bb\u003c/span\u003e \\[7\\].\n\n### V\u00e9rifications des correctifs disponibles\n\n#### Windows\n\nMicrosoft a mis \u00e0 disposition un script PowerShell qui permet de\nv\u00e9rifier si un correctif pour les vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 appliqu\u00e9 sur un\nsyst\u00e8me Windows \\[4\\].\n\n#### Linux\n\nAfin de s\u0027assurer de la pr\u00e9sence du m\u00e9canisme de s\u00e9curit\u00e9 KPTI sur un\nsyst\u00e8me utilisant un noyau Linux il est possible d\u0027ex\u00e9cuter la commande\nsuivante :\n\n\\[pastacode lang=\"bash\"\nmanual=\"dmesg%20%7C%20grep%20\u0027Kernel%2FUser%20page%20tables%20isolation\u0027\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nDans le cas o\u00f9 KPTI est activ\u00e9 un message sera affich\u00e9 en sortie.\n",
"cves": [
{
"name": "CVE-2017-5754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5754"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2018-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3640"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
}
],
"initial_release_date": "2018-01-04T00:00:00",
"last_revision_date": "2018-10-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056890 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056890/windows-10-update-kb4056890"
},
{
"title": "Avis de s\u00e9curit\u00e9 Amazon ALAS-2018-939 du 4 janvier 2018",
"url": "https://alas.aws.amazon.com/ALAS-2018-939.html"
},
{
"title": "Communiqu\u00e9 d\u0027Amazon\u00a0AWS-2018-013 en lien avec les vuln\u00e9rabilit\u00e9s d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://aws.amazon.com/fr/security/security-bulletins/AWS-2018-013/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-028 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-028"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-002",
"url": "https://fortiguard.com/psirt/FG-IR-18-002"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Android du 2 janvier 2018",
"url": "https://source.android.com/security/bulletin/2018-01-01"
},
{
"title": "Guide relatif \u00e0 la s\u00e9curit\u00e9 des syst\u00e8mes de virtualisation",
"url": "https://www.ssi.gouv.fr/guide/problematiques-de-securite-associees-a-la-virtualisation-des-systemes-dinformation"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-029 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-044 Multiples vuln\u00e9rabilit\u00e9s dans les produits Moxa",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-044"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-017 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-017"
},
{
"title": "Security Advisory 115 Intel",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-006 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-006"
},
{
"title": "Communication de Microsoft sur les d\u00e9pendances entre la mise \u00e0 jour et les logiciels anti-virus",
"url": "https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX231390 du 4 janvier 2018",
"url": "https://support.citrix.com/article/CTX231390"
},
{
"title": "Communiqu\u00e9 de la BSI",
"url": "https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Gefaelschte_BSI-Mails_12012018.html"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-013 Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-013"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-005 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-005"
},
{
"title": "Billet de blogue Mozilla",
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
},
{
"title": "Mesures \u00e0 mettre en oeuvre pour prot\u00e9ger son Windows Server",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-080 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-080"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Juniper",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10842\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Billet de blogue de Microsoft du 3 janvier 2018 sur un correctif pour Internet Explorer et Edge",
"url": "https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-mitigations-microsoft-edge-internet-explorer/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-039 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Virtualization",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-039/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-032 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-032/"
},
{
"title": "CERT KB",
"url": "https://www.kb.cert.org/vuls/id/584653"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-029"
},
{
"title": "Article ARM d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Avis de s\u00e9curit\u00e9 ARM du 3 janvier 2017",
"url": "https://developer.arm.com/support/security-update"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180002",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
},
{
"title": "Avis de vuln\u00e9rabilit\u00e9 d\u0027Intel et liste des processeurs vuln\u00e9rables",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr"
},
{
"title": "Communiqu\u00e9 Ubuntu",
"url": "https://insights.ubuntu.com/2018/01/04/ubuntu-updates-for-the-meltdown-spectre-vulnerabilities/"
},
{
"title": "Billet de blogue Google Project Zero",
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
},
{
"title": "Commentaires d\u0027AMD sur une \u00e9ventuelle vuln\u00e9rabilit\u00e9 de leurs processeurs",
"url": "https://www.amd.com/en/corporate/speculative-execution"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://spectreattack.com/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-077 Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-077"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180012 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180012"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-038 Multiples vuln\u00e9rabilit\u00e9s dans Oracle Sun Systems Products Suite",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-038/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-079 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-079"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft ADV180013 du 21 mai 2018",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric",
"url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Id=8786151194\u0026p_File_Name=SEVD-2018-005-01+-Spectre+and+Meltdown.pdf\u0026p_Reference=SEVD-2018-005-01"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-254 du 3 janvier 2018",
"url": "https://xenbits.xen.org/xsa/advisory-254.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s"
},
{
"title": "Article Intel d\u00e9taillant les vuln\u00e9rabilit\u00e9s ainsi que les contre-mesures envisag\u00e9es",
"url": "https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-002 Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-002"
},
{
"title": "Communiqu\u00e9 de Google sur les attaques utilisant une m\u00e9thode d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.google.com/faqs/answer/7622138"
},
{
"title": "Communiqu\u00e9 Intel",
"url": "https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-030 Vuln\u00e9rabilit\u00e9 dans le microgiciel Intel pour Ubuntu",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-030"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-004 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-004"
},
{
"title": "Mise \u00e0 jour du microgiciel Intel pour Linux relatif \u00e0 la CVE-2017-5715",
"url": "https://downloadcenter.intel.com/download/27337/Linux-Processor-Microcode-Data-File"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft pour les professionnels concernant les vuln\u00e9rabilit\u00e9s d\u0027attaques par canaux auxiliaires d\u0027ex\u00e9cution sp\u00e9culative",
"url": "https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-040 Vuln\u00e9rabilit\u00e9 dans le micrologiciel processeur pour Red Hat",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-040/"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-008 Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-008"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 de Microsoft KB4056892 du 3 janvier 2018",
"url": "https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892"
},
{
"title": "Article du 30 d\u00e9cembre 2017 sur l\u0027int\u00e9gration du correctif KPTI dans le noyau Linux",
"url": "https://lwn.net/Articles/742404/"
},
{
"title": "Article de blog publi\u00e9 par Microsoft au sujet de CVE-2018-3639",
"url": "https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/"
},
{
"title": "Article du 15 novembre 2017 sur le m\u00e9canisme de s\u00e9curit\u00e9 KAISER",
"url": "https://lwn.net/Articles/738975/"
},
{
"title": "Site d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": "https://meltdownattack.com/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT208394 du 4 janvier 2018",
"url": "https://support.apple.com/en-us/HT208394"
},
{
"title": "Avis CERT-FR CERTFR-2018-AVI-018 Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-018"
}
],
"reference": "CERTFR-2018-ALE-001",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout et correction de liens",
"revision_date": "2018-01-04T00:00:00.000000"
},
{
"description": "Ajout de liens",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles et sur les contournements possibles",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de liens et de recommandations pour Windows Server",
"revision_date": "2018-01-05T00:00:00.000000"
},
{
"description": "Ajout de d\u00e9tails sur les correctifs disponibles",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de liens et ajout de la section Preuve de concept",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Ajout de r\u00e8gles Yara",
"revision_date": "2018-01-09T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-10T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour des correctifs disponibles",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de la section Campagne de pourriel",
"revision_date": "2018-01-12T00:00:00.000000"
},
{
"description": "Ajout de correctifs disponibles en semaine 03",
"revision_date": "2018-01-19T00:00:00.000000"
},
{
"description": "modification des recommandations suite au communiqu\u00e9 d\u0027Intel",
"revision_date": "2018-01-23T00:00:00.000000"
},
{
"description": "ajout des bulletins de s\u00e9curit\u00e9 VMware, RedHat et SUSE",
"revision_date": "2018-02-12T00:00:00.000000"
},
{
"description": "Ajout de l\u0027annonce d\u0027Intel sur la sortie des derniers correctifs de s\u00e9curit\u00e9.",
"revision_date": "2018-02-23T00:00:00.000000"
},
{
"description": "Ajout des vuln\u00e9rabilit\u00e9s 3a et 4",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Correction mise en page et ajout de liens",
"revision_date": "2018-05-23T00:00:00.000000"
},
{
"description": "Ajout de bulletins Microsoft",
"revision_date": "2018-05-25T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte.",
"revision_date": "2018-10-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 25/05/2018 : ajout de bulletins Microsoft (cf.\nsection Documentation)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 22/05/2018 : publications de nouvelles variantes\\] \n\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/02/2018 : annonce d\u0027Intel sur la sortie des mises\n\u00e0 jour des micrologiciels (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 12/02/2018 : ajout des bulletins de s\u00e9curit\u00e9 VMware,\nRedHat et SUSE (cf. section Solution)\\]\u003c/strong\u003e\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 23/01/2018 : modification des recommandations suite\nau communiqu\u00e9 d\u0027Intel (cf. section Solution)\\]\u003c/strong\u003e\n\nLe 4 janvier 2018, deux vuln\u00e9rabilit\u00e9s affectant plusieurs familles de\nprocesseurs et pouvant conduire \u00e0 des fuites d\u0027informations ont \u00e9t\u00e9\nrendues publiques \\[1\\]\\[2\\]. Intitul\u00e9es Spectre et Meltdown, ces deux\nvuln\u00e9rabilit\u00e9s ont re\u00e7u les identifiants CVE-2017-5715, CVE-2017-5753\npour Spectre et CVE-2017-5754 pour Meltdown. Le 21 mai 2018, deux\nnouvelles vuln\u00e9rabilit\u00e9s identifi\u00e9es CVE-2018-3639 et CVE-2018-3640,\nreposant sur des principes similaires, ont \u00e9galement \u00e9t\u00e9 publi\u00e9es\n\\[42\\].\n\n### Vuln\u00e9rabilit\u00e9 Meltdown\n\nLes processeurs modernes int\u00e8grent plusieurs fonctionnalit\u00e9s visant \u00e0\nam\u00e9liorer leurs performances. Parmi celles-ci, l\u0027ex\u00e9cution dite\n*out-of-order* permet d\u0027ex\u00e9cuter les instructions d\u0027un programme en\nfonction de la disponibilit\u00e9 des ressources de calculs et plus\nn\u00e9cessairement de fa\u00e7on s\u00e9quentielle. Une faiblesse de ce m\u00e9canisme peut\ncependant conduire \u00e0 l\u0027ex\u00e9cution d\u0027une instruction sans que le niveau de\nprivil\u00e8ges requis par celle-ci ne soit correctement v\u00e9rifi\u00e9. Bien que le\nr\u00e9sultat de l\u0027ex\u00e9cution d\u0027une telle instruction ne soit pas valid\u00e9 par\nla suite, il peut \u00eatre possible de r\u00e9cup\u00e9rer l\u0027information en utilisant\nune attaque par canaux cach\u00e9s.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2017-5754 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des zones m\u00e9moires propres au syst\u00e8me\nd\u2019exploitation depuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En\nparticulier, l\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der\ndepuis un programme utilisateur \u00e0 la m\u00e9moire du syst\u00e8me d\u0027exploitation.\nCela peut conduire \u00e0 des fuites de donn\u00e9es sensibles pr\u00e9sentes en\nm\u00e9moire et peut inclure des informations d\u0027autres programmes ou encore\ndes cl\u00e9s de chiffrement. Cette fuite d\u0027informations peut aussi \u00eatre mise\nen \u0153uvre pour faciliter la compromission d\u0027un syst\u00e8me.\n\nLa vuln\u00e9rabilit\u00e9 CVE-2018-3640 exploite l\u2019ex\u00e9cution *out-of-order* sur\ndes instructions requ\u00e9rant un haut niveau de privil\u00e8ge pour permettre\nl\u0027acc\u00e8s en lecture \u00e0 des registres propres au syst\u00e8me d\u2019exploitation\ndepuis du code s\u2019ex\u00e9cutant de fa\u00e7on non-privil\u00e9gi\u00e9e. En particulier,\nl\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet d\u0027acc\u00e9der depuis un\nprogramme utilisateur \u00e0 des param\u00e8tres de configuration du processeur.\nCette fuite d\u0027informations peut aussi \u00eatre mise en \u0153uvre pour faciliter\nla compromission d\u0027un syst\u00e8me.\n\n### Vuln\u00e9rabilit\u00e9 Spectre\n\nL\u0027ex\u00e9cution sp\u00e9culative est une seconde technique d\u0027optimisation\nutilis\u00e9e par les processeurs modernes. Les d\u00e9pendances entre les\ninstructions limitent les possibilit\u00e9s d\u0027ex\u00e9cution *out-of-order*. Pour\nrem\u00e9dier \u00e0 cette limitation, le processeur \u00e9met des hypoth\u00e8ses\nconcernant les r\u00e9sultats non encore disponibles. Ceci lui permet de\npoursuivre l\u2019ex\u00e9cution *out-of-order* en utilisant ces hypoth\u00e8ses en\nremplacement des r\u00e9sultats attendus. On parle alors d\u0027ex\u00e9cution\nsp\u00e9culative. Ces hypoth\u00e8ses sont v\u00e9rifi\u00e9es par le processeur d\u00e8s que les\nr\u00e9sultats auxquels elles se rapportent deviennent disponibles. Si elles\nse r\u00e9v\u00e8lent correctes, le processeur valide l\u0027ex\u00e9cution sp\u00e9culative.\nMais inversement, si elles se r\u00e9v\u00e8lent erron\u00e9es, les effets de\nl\u0027ex\u00e9cution sp\u00e9culative doivent \u00eatre annul\u00e9s et l\u0027ex\u00e9cution doit\nreprendre au point on les hypoth\u00e8ses erron\u00e9es avaient \u00e9t\u00e9 \u00e9mises, c\u0027est\n\u00e0 dire l\u00e0 o\u00f9 l\u0027ex\u00e9cution sp\u00e9culative avait d\u00e9but\u00e9e.\n\nCependant les effets d\u0027une ex\u00e9cution sp\u00e9culative erron\u00e9e sur le cache\nperdurent. Or, en mesurant des temps d\u0027acc\u00e8s \u00e0 des zones m\u00e9moires, il\nest possible de conna\u00eetre l\u0027\u00e9tat du cache. Par cons\u00e9quent, un attaquant\nsera capable de d\u00e9terminer les r\u00e9sultats interm\u00e9diaires d\u0027une ex\u00e9cution\nsp\u00e9culative erron\u00e9e si ceux-ci influent sur l\u0027\u00e9tat du cache. Cette\nutilisation du cache pour mener \u00e0 bien l\u0027exploitation est commune aux\ntrois variantes de Spectre.\n\n#### Variante 1 (CVE-2017-5753)\n\nLe pr\u00e9dicteur de branches est un composant du processeur utilis\u00e9 pour\n\u00e9mettre des hypoth\u00e8ses concernant l\u0027adresse de la prochaine instruction\n\u00e0 ex\u00e9cuter. En particulier, il est utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts conditionnels. D\u0027autre part, ce composant est partag\u00e9 entre des\ncodes s\u0027ex\u00e9cutant dans des cloisonnements de s\u00e9curit\u00e9 diff\u00e9rents\n(processus, niveaux de privil\u00e8ge).\n\nDans la variante 1 de Spectre, un attaquant influe sur les heuristiques\ndu pr\u00e9dicteur de branches pour fausser la pr\u00e9diction d\u0027un saut\nconditionnel s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9, ce qui\na pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e. Un code\nest vuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e modifie le cache\nde fa\u00e7on qui d\u00e9pende d\u0027une valeur secr\u00e8te (c\u0027est \u00e0 dire non directement\naccessible depuis le cloisonnement dans lequel se situe l\u0027attaquant).\n\nExemple de code vuln\u00e9rable fourni dans l\u0027article:\n\n\\[pastacode lang=\"c\"\nmanual=\"if%20(x%20%3C%20array1_size)%0Ay%20%3D%20array2%5Barray1%5Bx%5D%20\\*%20256%5D%3B\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\nUn attaquant ma\u00eetrisant la valeur de x peut obtenir une lecture\narbitraire dans l\u0027espace d\u0027adressage du processus ex\u00e9cutant le code\nci-dessus. Pour cela, l\u0027attaquant commence par soumettre un grand nombre\nde x valides (c\u0027est \u00e0 dire v\u00e9rifiant la condition de la ligne 1) pour\nfaire croire au pr\u00e9dicteur de branches que la condition ligne 1 est\ntoujours vraie. Puis il soumet un x pointant \u00e0 une adresse arbitraire.\nLe pr\u00e9dicteur de branches estime n\u00e9anmoins que la condition est vraie,\nce qui d\u00e9clenche l\u0027ex\u00e9cution sp\u00e9culative de la ligne 2. La valeur\nsecr\u00e8te point\u00e9e par x est r\u00e9cup\u00e9r\u00e9e puis utilis\u00e9e pour former l\u0027adresse\nd\u0027une seconde lecture m\u00e9moire. Cette seconde lecture aura un effet sur\nle cache d\u00e9celable par l\u0027attaquant qui sera alors en mesure de retrouver\nla valeur secr\u00e8te.\n\n#### Variante 2 (CVE-2017-5715)\n\nLe pr\u00e9dicteur de branches est \u00e9galement utilis\u00e9 pour pr\u00e9dire l\u0027issue des\nsauts indirects. Dans la variante 2 de Spectre, un attaquant influe sur\nles heuristiques du pr\u00e9dicteur de branches pour fausser la pr\u00e9diction\nd\u0027un saut indirect s\u2019ex\u00e9cutant dans un autre cloisonnement de s\u00e9curit\u00e9,\nce qui a pour effet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e \u00e0\nune adresse arbitraire ma\u00eetris\u00e9e par l\u0027attaquant. En choisissant\ncorrectement le code ex\u00e9cut\u00e9 sp\u00e9culativement, l\u0027attaquant est alors\ncapable d\u0027obtenir une lecture arbitraire dans l\u0027espace d\u0027adressage du\nprocessus victime.\n\n#### Variante 3 (CVE-2018-3639)\n\nLes processeurs \u00e9mettent \u00e9galement des hypoth\u00e8ses concernant l\u0027adresse\nde certains acc\u00e8s m\u00e9moire. Pour b\u00e9n\u00e9ficier de plus de libert\u00e9s dans\nl\u0027ordre d\u0027ex\u00e9cution d\u0027op\u00e9rations de lecture m\u00e9moire, le processeur va\ndevoir pr\u00e9dire si celles-ci chevauchent des op\u00e9rations d\u0027\u00e9criture en\nattente d\u0027ex\u00e9cution. Si une op\u00e9ration de lecture ne chevauche aucune\nop\u00e9ration d\u0027\u00e9criture en attente d\u0027ex\u00e9cution, rien ne s\u0027oppose \u00e0 qu\u0027elle\npuisse \u00eatre ex\u00e9cut\u00e9e de fa\u00e7on anticip\u00e9e.\n\nDans la variante 3 de Spectre, un attaquant influe sur les heuristiques\ndu processeur utilis\u00e9es pour la pr\u00e9diction d\u0027adresses, ce qui a pour\neffet de d\u00e9clencher une ex\u00e9cution sp\u00e9culative erron\u00e9e d\u0027une op\u00e9ration de\nlecture m\u00e9moire et des instructions qui en d\u00e9pendent. Un code est\nvuln\u00e9rable si cette ex\u00e9cution sp\u00e9culative erron\u00e9e manipule une valeur\nsecr\u00e8te et la laisse fuir \u00e0 travers un \u00e9tat observable du cache\n\nMicrosoft (une des parties ayant d\u00e9couvert la vuln\u00e9rabilit\u00e9) \\[43\\]\naffirme ne pas avoir identifi\u00e9 de code vuln\u00e9rable dans leurs produits,\nce qui laisse penser que les codes vuln\u00e9rables sont peu fr\u00e9quents.\n\n### Impact\n\nLes vuln\u00e9rabilit\u00e9s d\u00e9crites dans cette alerte peuvent impacter tous les\nsyst\u00e8mes utilisant un processeur vuln\u00e9rable et donc de fa\u00e7on\nind\u00e9pendante du syst\u00e8me d\u0027exploitation. Selon les chercheurs \u00e0 l\u0027origine\nde la d\u00e9couverte de ces failles, il est ainsi possible d\u0027acc\u00e9der \u00e0\nl\u0027int\u00e9gralit\u00e9 de la m\u00e9moire physique sur des syst\u00e8mes Linux et OSX et \u00e0\nune part importante de la m\u00e9moire sur un syst\u00e8me Windows.\n\nOn notera que l\u0027impact peut \u00eatre plus particuli\u00e8rement important dans\ndes syst\u00e8mes de ressources partag\u00e9s de type conteneur (Docker, LXC) o\u00f9\nil serait possible depuis un environnement restreint d\u0027acc\u00e9der \u00e0 toutes\nles donn\u00e9es pr\u00e9sentes sur la machine physique dans lequel s\u0027ex\u00e9cute le\nconteneur ou encore dans des environnements virtualis\u00e9s utilisant la\npara-virtualisation de type Xen.\n\n### Preuve de concept\n\nLe CERT-FR constate que des preuves de concept fonctionnelles pour\nMeltdown sont d\u00e9sormais publiques. Les r\u00e8gles Yara suivantes servent \u00e0\nd\u00e9tecter les binaires li\u00e9s \u00e0 la biblioth\u00e8que publi\u00e9e par l\u0027Institute of\nApplied Information Processing and Communications (IAIK) :\n\n\\[pastacode lang=\"c\"\nmanual=\"rule%20meltdown_iaik_libkdump_meltdown_nonull%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_nonull%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A6%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018A9%0A%0A.text%3A00000000000018A9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18A9%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B48j%0A%0A.text%3A00000000000018A9%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018AB%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018AF%2074%20F8%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18A9%0A%0A.text%3A00000000000018B1%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F8%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%20%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown_fast%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown_fast%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%20%20%20%20%2F\\*%0A%0A.text%3A000000000000184F%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20%20%20rax%2C%20rax%0A%0A.text%3A0000000000001852%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A0000000000001854%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A0000000000001858%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%20%3D%20%7B%0A%0A48%2031%20C0%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D%0A%0A%0Arule%20meltdown_iaik_libkdump_meltdown%20%7B%0A%0Ameta%3A%0A%0Aauthor%20%3D%20%22ANSSI%22%0A%0ATLP_level%20%3D%20%22White%22%0A%0Adescription%20%3D%20%22Detects%20Meltdown%20PoC%20libkdump%20meltdown%20method%22%0A%0Aversion%20%3D%20%221.0%22%0A%0Alast_modified%20%3D%20%222018-01-09%22%0A%0Astrings%3A%0A%0A%2F\\*%0A%0A.text%3A00000000000018A8%2048%2031%20C0%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20xor%20%20%20%20%20rax%2C%20rax%20%20%20.text%3A00000000000018AB%0A%0A.text%3A00000000000018AB%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20loc_18AB%3A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3B%20CODE%20XREF%3A%20libkdump_read_tsx%2B4Dj%0A%0A.text%3A00000000000018AB%2048%208B%2036%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20rsi%2C%20%5Brsi%5D%0A%0A.text%3A00000000000018AE%208A%2001%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20%20al%2C%20%5Brcx%5D%0A%0A.text%3A00000000000018B0%2048%20C1%20E0%200C%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20shl%20%20%20%20%20%20%20rax%2C%200Ch%0A%0A.text%3A00000000000018B4%2074%20F5%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20jz%20%20%20%20%20%20%20%20short%20loc_18AB%0A%0A.text%3A00000000000018B6%2048%208B%201C%2003%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20mov%20%20%20%20rbx%2C%20%5Brbx%2Brax%5D%0A%0A\\*%2F%0A%0A%24asm%3D%7B%0A%0A48%2031%20C0%0A%0A48%208B%2036%0A%0A8A%2001%0A%0A48%20C1%20E0%200C%0A%0A74%20F5%0A%0A48%208B%201C%2003%0A%0A%7D%0A%0Acondition%3A%0A%0A%24asm%0A%0A%7D\"\nmessage=\"\" highlight=\"\" provider=\"manual\"/\\]\n\n### Campagne de pourriels\n\nLe CERT-FR constate qu\u0027une campagne de pourriels visant \u00e0 distribuer des\nlogiciels malveillants a \u00e9t\u00e9 lanc\u00e9e afin de profiter de la situation\nautour des vuln\u00e9rabilit\u00e9 Spectre et Meltdown \\[32\\]. Des attaquants se\nfaisant passer pour la *\u003cspan lang=\"de\"\u003eBundesamt f\u00fcr Sicherheit in der\nInformationstechnik \u003c/span\u003e*\u003cspan lang=\"de\"\u003e(BSI), l\u0027\u00e9quivalent allemand\nde l\u0027ANSSI, ont envoy\u00e9 des courriers \u00e9lectroniques invitant leurs\ndestinataires \u00e0 se rendre sur une copie du site de la BSI. La diff\u00e9rence\navec le site officiel \u00e9tait une modification de l\u0027alerte concernant les\nvuln\u00e9rabilit\u00e9s: l\u0027utilisateur \u00e9tait invit\u00e9 \u00e0 installer un correctif qui\nse trouvait \u00eatre un logiciel malveillant.\u003c/span\u003e\n\nLe CERT-FR rappelle de faire preuve de la plus grande vigilance quand \u00e0\nl\u0027ouverture des courriers \u00e9lectroniques ainsi que d\u0027installer les\ncorrectifs de s\u00e9curit\u00e9 dans les plus brefs d\u00e9lais, et ce uniquement\ndepuis les sources officielles des \u00e9diteurs.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de fuite d\u0027informations dans des processeurs",
"vendor_advisories": [
{
"published_at": null,
"title": "Sites d\u00e9taillant le principe de la vuln\u00e9rabilit\u00e9",
"url": null
}
]
}
WID-SEC-W-2023-2917
Vulnerability from csaf_certbund - Published: 2023-11-14 23:00 - Updated: 2025-09-03 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2917 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2917.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2917 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2917"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-016 vom 2023-11-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-016_FFPSv7-S10_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-017 vom 2023-11-14",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-017_FFPSv7-S11_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-019 vom 2023-11-16",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/11/Xerox-Security-Bulletin-XRX23-019-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin XRX23-021",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/11/XRX23-021_FFPSv2_Win10_SecurityBulletin_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-022 vom 2023-12-01",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/11/XRX23-022_FFPSv9-S11_MediaInstall_Nov2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-001 vom 2024-03-11",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox%C2%AE-Security-Bulletin-XRX24-001-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3949-1 vom 2024-11-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019796.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14572-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-03T22:00:00.000+00:00",
"generator": {
"date": "2025-09-04T06:26:09.420+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-2917",
"initial_release_date": "2023-11-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-11-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-11-28T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-11-30T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-11-07T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "9",
"summary": "Referenz(en) aufgenommen: EUVD-2023-44310"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Xerox FreeFlow Print Server 9",
"product_id": "T002977",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:9"
}
}
},
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T015631",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
},
{
"category": "product_version",
"name": "v9 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v9 for Solaris",
"product_id": "T028053",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
}
}
},
{
"category": "product_version",
"name": "v2 / Windows 10",
"product": {
"name": "Xerox FreeFlow Print Server v2 / Windows 10",
"product_id": "T031383",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v2__windows_10"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5715",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2018-3639",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2021-44917",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2021-44917"
},
{
"cve": "CVE-2021-46784",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2021-46784"
},
{
"cve": "CVE-2022-31008",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-31008"
},
{
"cve": "CVE-2022-32206",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32221",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3924",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-3924"
},
{
"cve": "CVE-2022-41409",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-41409"
},
{
"cve": "CVE-2022-48337",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48338",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48338"
},
{
"cve": "CVE-2022-48339",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2022-4899",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2022-4899"
},
{
"cve": "CVE-2023-0049",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0288",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0465",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0666",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0666"
},
{
"cve": "CVE-2023-0668",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-0668"
},
{
"cve": "CVE-2023-1127",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1393",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1393"
},
{
"cve": "CVE-2023-1906",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1906"
},
{
"cve": "CVE-2023-1981",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-1981"
},
{
"cve": "CVE-2023-2004",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2004"
},
{
"cve": "CVE-2023-22025",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22043",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22043"
},
{
"cve": "CVE-2023-22067",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22128",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22128"
},
{
"cve": "CVE-2023-22129",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-22129"
},
{
"cve": "CVE-2023-23914",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23914"
},
{
"cve": "CVE-2023-23915",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23915"
},
{
"cve": "CVE-2023-23916",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-24329",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24805",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-24805"
},
{
"cve": "CVE-2023-25193",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-2650",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-27985",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-27985"
},
{
"cve": "CVE-2023-27986",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-27986"
},
{
"cve": "CVE-2023-2828",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28319",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28319"
},
{
"cve": "CVE-2023-28320",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28450",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28450"
},
{
"cve": "CVE-2023-2854",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2854"
},
{
"cve": "CVE-2023-2855",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2855"
},
{
"cve": "CVE-2023-2857",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2857"
},
{
"cve": "CVE-2023-2858",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2858"
},
{
"cve": "CVE-2023-2879",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2879"
},
{
"cve": "CVE-2023-28879",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-28879"
},
{
"cve": "CVE-2023-2911",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-2911"
},
{
"cve": "CVE-2023-29402",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29403",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29403"
},
{
"cve": "CVE-2023-29404",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29404"
},
{
"cve": "CVE-2023-29405",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29405"
},
{
"cve": "CVE-2023-29406",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-29491",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29491"
},
{
"cve": "CVE-2023-29499",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-29499"
},
{
"cve": "CVE-2023-30581",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30581"
},
{
"cve": "CVE-2023-30582",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30582"
},
{
"cve": "CVE-2023-30583",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30583"
},
{
"cve": "CVE-2023-30584",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30584"
},
{
"cve": "CVE-2023-30585",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30585"
},
{
"cve": "CVE-2023-30586",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30586"
},
{
"cve": "CVE-2023-30587",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30587"
},
{
"cve": "CVE-2023-30588",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30588"
},
{
"cve": "CVE-2023-30589",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30589"
},
{
"cve": "CVE-2023-30590",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-30590"
},
{
"cve": "CVE-2023-31122",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31122"
},
{
"cve": "CVE-2023-31124",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31124"
},
{
"cve": "CVE-2023-31130",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31130"
},
{
"cve": "CVE-2023-31147",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31147"
},
{
"cve": "CVE-2023-3138",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31484",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-31486",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-31486"
},
{
"cve": "CVE-2023-3195",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3195"
},
{
"cve": "CVE-2023-32002",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32002"
},
{
"cve": "CVE-2023-32003",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32003"
},
{
"cve": "CVE-2023-32004",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32004"
},
{
"cve": "CVE-2023-32005",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32005"
},
{
"cve": "CVE-2023-32006",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32006"
},
{
"cve": "CVE-2023-32067",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-3247",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3247"
},
{
"cve": "CVE-2023-32558",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32558"
},
{
"cve": "CVE-2023-32559",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32559"
},
{
"cve": "CVE-2023-32573",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32573"
},
{
"cve": "CVE-2023-32611",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32611"
},
{
"cve": "CVE-2023-32636",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32636"
},
{
"cve": "CVE-2023-32643",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32643"
},
{
"cve": "CVE-2023-32665",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32665"
},
{
"cve": "CVE-2023-32681",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32681"
},
{
"cve": "CVE-2023-32762",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32762"
},
{
"cve": "CVE-2023-32763",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-32763"
},
{
"cve": "CVE-2023-34241",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-34241"
},
{
"cve": "CVE-2023-34969",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-36053",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36053"
},
{
"cve": "CVE-2023-36191",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36191"
},
{
"cve": "CVE-2023-3666",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3666"
},
{
"cve": "CVE-2023-36664",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-36664"
},
{
"cve": "CVE-2023-37201",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37201"
},
{
"cve": "CVE-2023-37202",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37202"
},
{
"cve": "CVE-2023-37207",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37207"
},
{
"cve": "CVE-2023-37208",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37208"
},
{
"cve": "CVE-2023-37211",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-37211"
},
{
"cve": "CVE-2023-3823",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3823"
},
{
"cve": "CVE-2023-3824",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-3824"
},
{
"cve": "CVE-2023-38403",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-38403"
},
{
"cve": "CVE-2023-4045",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4045"
},
{
"cve": "CVE-2023-4046",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4046"
},
{
"cve": "CVE-2023-4047",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4047"
},
{
"cve": "CVE-2023-40477",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-40477"
},
{
"cve": "CVE-2023-4048",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4048"
},
{
"cve": "CVE-2023-4049",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4049"
},
{
"cve": "CVE-2023-4050",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4050"
},
{
"cve": "CVE-2023-4054",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4054"
},
{
"cve": "CVE-2023-4055",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4055"
},
{
"cve": "CVE-2023-4056",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4056"
},
{
"cve": "CVE-2023-41080",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-41080"
},
{
"cve": "CVE-2023-41081",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-41081"
},
{
"cve": "CVE-2023-43622",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-43622"
},
{
"cve": "CVE-2023-4504",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4504"
},
{
"cve": "CVE-2023-4573",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4573"
},
{
"cve": "CVE-2023-4574",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4574"
},
{
"cve": "CVE-2023-4575",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4575"
},
{
"cve": "CVE-2023-4576",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4576"
},
{
"cve": "CVE-2023-45802",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-45802"
},
{
"cve": "CVE-2023-4581",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4581"
},
{
"cve": "CVE-2023-4584",
"product_status": {
"known_affected": [
"T028053",
"T002207",
"T027843",
"T015632",
"T002977",
"T015631",
"T031383"
]
},
"release_date": "2023-11-14T23:00:00.000+00:00",
"title": "CVE-2023-4584"
}
]
}
WID-SEC-W-2023-2072
Vulnerability from csaf_certbund - Published: 2018-05-21 22:00 - Updated: 2024-09-02 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Prozessoren unterschiedlicher Hersteller ausnutzen, um Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- CISCO Appliance\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2072 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-2072.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2072 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2072"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00115 vom 2018-05-21",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"category": "external",
"summary": "VmWare Security Advisory VMSA-2018-0012",
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0012.html"
},
{
"category": "external",
"summary": "Microsoft Advisory ADV180012",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"category": "external",
"summary": "Cisco Security Advisory cisco-sa-20180521-cpusidechannel",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"category": "external",
"summary": "AMD Security Advisory",
"url": "https://www.amd.com/en/corporate/security-updates"
},
{
"category": "external",
"summary": "Microsoft Advisory ADV180013",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180013"
},
{
"category": "external",
"summary": "RedHat CVE Database",
"url": "https://access.redhat.com/security/cve/cve-2018-3639"
},
{
"category": "external",
"summary": "RedHat CVE Database",
"url": "https://access.redhat.com/security/cve/cve-2018-3640"
},
{
"category": "external",
"summary": "Citrix Security Advisory CTX235225 vom 2018-05-22",
"url": "https://support.citrix.com/article/CTX235225"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23",
"url": "http://linux.oracle.com/errata/ELSA-2018-4114.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1635 vom 2018-05-22",
"url": "http://rhn.redhat.com/errata/RHSA-2018-1635.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1636 vom 2018-05-22",
"url": "http://rhn.redhat.com/errata/RHSA-2018-1636.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1377-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181377-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1378-1 vom 2018-05-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181378-1.html"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html"
},
{
"category": "external",
"summary": "Update des Cisco Security Advisory cisco-sa-20180521-cpusidechannel vom 2018-05-23",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4210 vom 2018-05-25",
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1826 vom 2018-06-12",
"url": "http://rhn.redhat.com/errata/RHSA-2018-1826.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2018-0005 vom 2018-06-13",
"url": "http://security.libvirt.org/2018/0005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1965 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1967 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:1997 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2001 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2003 vom 2018-06-27",
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2060 vom 2018-06-27",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2060.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11",
"url": "http://linux.oracle.com/errata/ELSA-2018-2162.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-2164 vom 2018-07-11",
"url": "http://linux.oracle.com/errata/ELSA-2018-2164.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2162 vom 2018-07-11",
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2161 vom 2018-07-11",
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2164 vom 2018-07-11",
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2172 vom 2018-07-11",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:1935-1 vom 2018-07-13",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181935-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2018:2162 vom 2018-07-13",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-2162-Important-CentOS-6-qemu-kvm-Security-Update-tp4645175.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2216 vom 2018-07-17",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2216.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2228 vom 2018-07-20",
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2246 vom 2018-07-24",
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2250 vom 2018-07-24",
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2258 vom 2018-07-25",
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2076-1 vom 2018-07-27",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182076-1.html"
},
{
"category": "external",
"summary": "Update des Cisco Security Advisory cisco-sa-20180521-cpusidechannel vom 2018-07-26",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html"
},
{
"category": "external",
"summary": "Lenovo Security Advisory LEN-22133 vom 2018-07-27",
"url": "https://support.lenovo.com/de/de/solutions/len-22133"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2289 vom 2018-07-30",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2289.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2289 vom 2018-07-31",
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2309 vom 2018-08-06",
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2328 vom 2018-08-06",
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2364 vom 2018-08-07",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2364.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2363 vom 2018-08-07",
"url": "http://rhn.redhat.com/errata/RHSA-2018-2363.html"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180013",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013"
},
{
"category": "external",
"summary": "Microsoft Security Advisory ADV180012",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180012"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2304-1 vom 2018-08-12",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182304-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2384"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2388"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2389"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2395"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2390"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2391"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2393"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15",
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2331-1 vom 2018-08-15",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182331-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4198 vom 2018-08-16",
"url": "http://linux.oracle.com/errata/ELSA-2018-4198.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2338-1 vom 2018-08-16",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182338-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2335-1 vom 2018-08-16",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182335-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2340-1 vom 2018-08-16",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182340-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4273 vom 2018-08-17",
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3756-1 vom 2018-08-28",
"url": "http://www.ubuntu.com/usn/usn-3756-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2556-1 vom 2018-08-30",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182556-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2565-1 vom 2018-08-31",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182565-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2615-1 vom 2018-09-05",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182615-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:2650-1 vom 2018-09-07",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182650-1.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4235 vom 2018-10-02",
"url": "http://linux.oracle.com/errata/ELSA-2018-4235.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2018:3407 vom 2018-10-31",
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21",
"url": "http://linux.oracle.com/errata/ELSA-2018-4285.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:0049-1 vom 2019-01-10",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4531 vom 2019-02-07",
"url": "http://linux.oracle.com/errata/ELSA-2019-4531.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4585 vom 2019-03-15",
"url": "http://linux.oracle.com/errata/ELSA-2019-4585.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:1046 vom 2019-05-08",
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:1211-1 vom 2019-05-11",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191211-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4469 vom 2019-06-23",
"url": "https://www.debian.org/security/2019/dsa-4469"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4702 vom 2019-08-04",
"url": "http://linux.oracle.com/errata/ELSA-2019-4702.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-4732 vom 2019-08-04",
"url": "http://linux.oracle.com/errata/ELSA-2019-4732.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2020-0202 vom 2020-04-24",
"url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009541.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2020-0196 vom 2020-04-24",
"url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009537.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2020-0157 vom 2020-04-24",
"url": "https://oss.oracle.com/pipermail/el-errata/2020-January/009534.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11023 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11023"
},
{
"category": "external",
"summary": "Huawei Security Advisory HUAWEI-SA-20180615-01-CPU vom 2020-07-22",
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180615-01-cpu-en"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2323 vom 2020-08-12",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2540-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3007-1 vom 2021-09-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3969-1 vom 2021-12-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3324-1 vom 2023-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015910.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3333-1 vom 2023-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2023:3349-1 vom 2023-08-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-August/015945.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12605.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12604 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12604.html"
}
],
"source_lang": "en-US",
"title": "Prozessoren verschiedener Hersteller: Mehrere Schwachstellen erm\u00f6glichen Umgehen von Sicherheitsvorkehrungen",
"tracking": {
"current_release_date": "2024-09-02T22:00:00.000+00:00",
"generator": {
"date": "2024-09-03T08:16:44.354+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2023-2072",
"initial_release_date": "2018-05-21T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-05-21T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-05-21T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "3",
"summary": "\u00e4nderungen"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "4",
"summary": "referenzen"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "5",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2018-05-22T22:00:00.000+00:00",
"number": "7",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "8",
"summary": "New remediations available"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "9",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "10",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-23T22:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-05-24T22:00:00.000+00:00",
"number": "12",
"summary": "Added references"
},
{
"date": "2018-05-27T22:00:00.000+00:00",
"number": "13",
"summary": "New remediations available"
},
{
"date": "2018-05-28T22:00:00.000+00:00",
"number": "14",
"summary": "new updates SuSE"
},
{
"date": "2018-05-28T22:00:00.000+00:00",
"number": "15",
"summary": "Added references"
},
{
"date": "2018-05-31T22:00:00.000+00:00",
"number": "16",
"summary": "neue Updates Suse"
},
{
"date": "2018-06-07T22:00:00.000+00:00",
"number": "17",
"summary": "Added references"
},
{
"date": "2018-06-13T22:00:00.000+00:00",
"number": "18",
"summary": "New remediations available"
},
{
"date": "2018-06-17T22:00:00.000+00:00",
"number": "19",
"summary": "Added references"
},
{
"date": "2018-06-27T22:00:00.000+00:00",
"number": "20",
"summary": "Added references"
},
{
"date": "2018-07-01T22:00:00.000+00:00",
"number": "21",
"summary": "Added references"
},
{
"date": "2018-07-11T22:00:00.000+00:00",
"number": "22",
"summary": "New remediations available"
},
{
"date": "2018-07-12T22:00:00.000+00:00",
"number": "23",
"summary": "New remediations available"
},
{
"date": "2018-07-15T22:00:00.000+00:00",
"number": "24",
"summary": "New remediations available"
},
{
"date": "2018-07-17T22:00:00.000+00:00",
"number": "25",
"summary": "New remediations available"
},
{
"date": "2018-07-19T22:00:00.000+00:00",
"number": "26",
"summary": "New remediations available"
},
{
"date": "2018-07-24T22:00:00.000+00:00",
"number": "27",
"summary": "New remediations available"
},
{
"date": "2018-07-24T22:00:00.000+00:00",
"number": "28",
"summary": "New remediations available"
},
{
"date": "2018-07-25T22:00:00.000+00:00",
"number": "29",
"summary": "New remediations available"
},
{
"date": "2018-07-26T22:00:00.000+00:00",
"number": "30",
"summary": "New remediations available"
},
{
"date": "2018-07-26T22:00:00.000+00:00",
"number": "31",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-07-29T22:00:00.000+00:00",
"number": "32",
"summary": "New remediations available"
},
{
"date": "2018-07-29T22:00:00.000+00:00",
"number": "33",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-07-30T22:00:00.000+00:00",
"number": "34",
"summary": "New remediations available"
},
{
"date": "2018-08-05T22:00:00.000+00:00",
"number": "35",
"summary": "New remediations available"
},
{
"date": "2018-08-07T22:00:00.000+00:00",
"number": "36",
"summary": "New remediations available"
},
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "37",
"summary": "New remediations available"
},
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "38",
"summary": "New remediations available"
},
{
"date": "2018-08-12T22:00:00.000+00:00",
"number": "39",
"summary": "New remediations available"
},
{
"date": "2018-08-14T22:00:00.000+00:00",
"number": "40",
"summary": "New remediations available"
},
{
"date": "2018-08-15T22:00:00.000+00:00",
"number": "41",
"summary": "New remediations available"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "42",
"summary": "New remediations available"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "43",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-16T22:00:00.000+00:00",
"number": "44",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-08-27T22:00:00.000+00:00",
"number": "45",
"summary": "Added references"
},
{
"date": "2018-08-27T22:00:00.000+00:00",
"number": "46",
"summary": "New remediations available"
},
{
"date": "2018-08-30T22:00:00.000+00:00",
"number": "47",
"summary": "New remediations available"
},
{
"date": "2018-09-04T22:00:00.000+00:00",
"number": "48",
"summary": "New remediations available"
},
{
"date": "2018-09-09T22:00:00.000+00:00",
"number": "49",
"summary": "New remediations available"
},
{
"date": "2018-10-01T22:00:00.000+00:00",
"number": "50",
"summary": "New remediations available"
},
{
"date": "2018-10-30T23:00:00.000+00:00",
"number": "51",
"summary": "New remediations available"
},
{
"date": "2018-11-20T23:00:00.000+00:00",
"number": "52",
"summary": "New remediations available"
},
{
"date": "2019-01-09T23:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-02-06T23:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-03-03T23:00:00.000+00:00",
"number": "55",
"summary": "Referenz(en) aufgenommen: ELSA-2019-0435"
},
{
"date": "2019-03-14T23:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-05-02T22:00:00.000+00:00",
"number": "57",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-8F2B27EFCE"
},
{
"date": "2019-05-08T22:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-05-12T22:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-06-23T22:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2019-08-04T22:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2020-04-23T22:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-22T22:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Huawei aufgenommen"
},
{
"date": "2020-08-12T22:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-09-09T22:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-07T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-08-15T22:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-08-16T22:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-08-17T22:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "72"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Cisco Catalyst",
"product": {
"name": "Cisco Catalyst",
"product_id": "T000491",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:catalyst:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Nexus",
"product": {
"name": "Cisco Nexus",
"product_id": "T004033",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:nexus:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Router",
"product": {
"name": "Cisco Router",
"product_id": "T003258",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:router:-"
}
}
},
{
"category": "product_name",
"name": "Cisco Unified Computing System (UCS)",
"product": {
"name": "Cisco Unified Computing System (UCS)",
"product_id": "163824",
"product_identification_helper": {
"cpe": "cpe:/h:cisco:unified_computing_system:-"
}
}
}
],
"category": "vendor",
"name": "Cisco"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Citrix Systems XenServer 7.0",
"product_id": "T007798",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:7.0"
}
}
},
{
"category": "product_version",
"name": "7.1",
"product": {
"name": "Citrix Systems XenServer 7.1",
"product_id": "T009506",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:7.1"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "Citrix Systems XenServer 7.2",
"product_id": "T010154",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:7.2"
}
}
},
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "Citrix Systems XenServer 7.3",
"product_id": "T011969",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:7.3"
}
}
},
{
"category": "product_version",
"name": "7.4",
"product": {
"name": "Citrix Systems XenServer 7.4",
"product_id": "T012232",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:7.4"
}
}
}
],
"category": "product_name",
"name": "XenServer"
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Huawei OceanStor",
"product": {
"name": "Huawei OceanStor",
"product_id": "T016821",
"product_identification_helper": {
"cpe": "cpe:/h:huawei:oceanstor_uds:-"
}
}
}
],
"category": "vendor",
"name": "Huawei"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Lenovo BIOS",
"product": {
"name": "Lenovo BIOS",
"product_id": "T005651",
"product_identification_helper": {
"cpe": "cpe:/h:lenovo:bios:-"
}
}
}
],
"category": "vendor",
"name": "Lenovo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source QEMU",
"product": {
"name": "Open Source QEMU",
"product_id": "185878",
"product_identification_helper": {
"cpe": "cpe:/a:qemu:qemu:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "136752",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:3.1"
}
}
},
{
"category": "product_name",
"name": "VMware vCenter Server (VirtualCenter)",
"product": {
"name": "VMware vCenter Server (VirtualCenter)",
"product_id": "T012302",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:vcenter_server:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-3639",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Prozessoren mehrerer Hersteller. Diese, Spectre V4 genannte Schwachstelle kann wie Spectre V1 und V2 \u00fcber einen Seitenkanalangriff ausgenutzt werden (Speculative Store Bypass (SSB)). Ein lokaler Angreifer kann das ausnutzen um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen zu umgehen."
}
],
"product_status": {
"known_affected": [
"185878",
"T004033",
"T005651",
"T011119",
"T007798",
"163824",
"136752",
"67646",
"T009506",
"T003258",
"T012302",
"T010154",
"T016821",
"T011586",
"T012232",
"T016874",
"T004914",
"2951",
"T002207",
"T000126",
"1727",
"T009575",
"T011969",
"T000491"
]
},
"release_date": "2018-05-21T22:00:00.000+00:00",
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-3640",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Prozessoren mehrerer Hersteller. Diese, Spectre V4 genannte Schwachstelle kann wie Spectre V1 und V2 \u00fcber einen Seitenkanalangriff ausgenutzt werden (Rogue System Register Read (RSRE)). Ein lokaler Angreifer kann das ausnutzen um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen zu umgehen."
}
],
"product_status": {
"known_affected": [
"185878",
"T004033",
"T005651",
"T011119",
"T007798",
"163824",
"136752",
"67646",
"T009506",
"T003258",
"T012302",
"T010154",
"T011586",
"T012232",
"T004914",
"2951",
"T002207",
"T000126",
"1727",
"T009575",
"T011969",
"T000491"
]
},
"release_date": "2018-05-21T22:00:00.000+00:00",
"title": "CVE-2018-3640"
}
]
}
tid-103
Vulnerability from emb3d
Operating system memory safety models rely on processor hardware to enforce separation between different virtual memory spaces. Failures of processor architectures to properly deliver these security guarantees can lead to sensitive information being disclosed across the boundaries between different kernel and process memory spaces. The performance optimization features in modern processors have been shown to be a source of such data leakage vulnerabilities. Data leakage through timing-based side channels introduced by the behavior of processor features such as memory caches have long been known to be effective against cryptographic implementations. The Spectre and Meltdown vulnerabilities announced in 2018 brought attention to weaknesses in certain microarchitectural performance features that could be manipulated in conjunction with memory cache timing techniques to leak data across OS virtual memory bounds. Spectre / Meltdown, and subsequent research work, demonstrated that speculative execution features (e.g., branch prediction, speculative memory loads/stores, out-of-order execution, etc.) could lead to memory locations being read into the CPU’s cache in violation of virtual memory permissions. Malicious code could then utilize a subsequent cache timing side channel attack to extract the data stored in those memory locations.
- CWE-1037: Processor Optimization Removal or Modification of Security-critical Code
- CWE-1264: Hardware Logic with Insecure De-Synchronization between Control and Data Channels
FKIE_CVE-2018-3639
Vulnerability from fkie_nvd - Published: 2018-05-22 12:29 - Updated: 2024-11-21 04:05| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html | Broken Link | |
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html | Broken Link | |
| secure@intel.com | http://support.lenovo.com/us/en/solutions/LEN-22133 | Third Party Advisory | |
| secure@intel.com | http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html | Third Party Advisory | |
| secure@intel.com | http://www.openwall.com/lists/oss-security/2020/06/10/1 | Mailing List, Third Party Advisory | |
| secure@intel.com | http://www.openwall.com/lists/oss-security/2020/06/10/2 | Mailing List, Third Party Advisory | |
| secure@intel.com | http://www.openwall.com/lists/oss-security/2020/06/10/5 | Mailing List, Third Party Advisory | |
| secure@intel.com | http://www.securityfocus.com/bid/104232 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.securitytracker.com/id/1040949 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://www.securitytracker.com/id/1042004 | Third Party Advisory, VDB Entry | |
| secure@intel.com | http://xenbits.xen.org/xsa/advisory-263.html | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1629 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1630 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1632 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1633 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1635 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1636 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1637 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1638 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1639 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1640 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1641 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1642 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1643 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1644 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1645 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1646 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1647 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1648 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1649 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1650 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1651 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1652 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1653 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1654 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1655 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1656 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1657 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1658 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1659 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1660 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1661 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1662 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1663 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1664 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1665 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1666 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1667 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1668 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1669 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1674 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1675 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1676 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1686 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1688 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1689 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1690 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1696 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1710 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1711 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1737 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1738 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1826 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1854 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1965 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1967 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:1997 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2001 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2003 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2006 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2060 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2161 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2162 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2164 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2171 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2172 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2216 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2228 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2246 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2250 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2258 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2289 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2309 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2328 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2363 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2364 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2387 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2394 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2396 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3396 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3397 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3398 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3399 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3400 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3401 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3402 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3407 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3423 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3424 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2018:3425 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:0148 | Broken Link | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:1046 | Third Party Advisory | |
| secure@intel.com | https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf | Third Party Advisory | |
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf | Third Party Advisory | |
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
| secure@intel.com | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
| secure@intel.com | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://nvidia.custhelp.com/app/answers/detail/a_id/4787 | Third Party Advisory | |
| secure@intel.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 | Patch, Third Party Advisory, Vendor Advisory | |
| secure@intel.com | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 | Third Party Advisory | |
| secure@intel.com | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20180521-0001/ | Third Party Advisory | |
| secure@intel.com | https://support.citrix.com/article/CTX235225 | Third Party Advisory | |
| secure@intel.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us | Third Party Advisory | |
| secure@intel.com | https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html | Third Party Advisory | |
| secure@intel.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3651-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3652-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3653-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3653-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3654-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3654-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3655-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3655-2/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3679-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3680-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3756-1/ | Third Party Advisory | |
| secure@intel.com | https://usn.ubuntu.com/3777-3/ | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4210 | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2018/dsa-4273 | Third Party Advisory | |
| secure@intel.com | https://www.exploit-db.com/exploits/44695/ | Exploit, Third Party Advisory, VDB Entry | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html | Third Party Advisory | |
| secure@intel.com | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
| secure@intel.com | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 | Third Party Advisory | |
| secure@intel.com | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
| secure@intel.com | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Third Party Advisory | |
| secure@intel.com | https://www.synology.com/support/security/Synology_SA_18_23 | Third Party Advisory | |
| secure@intel.com | https://www.us-cert.gov/ncas/alerts/TA18-141A | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.lenovo.com/us/en/solutions/LEN-22133 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/06/10/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/06/10/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2020/06/10/5 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104232 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040949 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1042004 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://xenbits.xen.org/xsa/advisory-263.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1629 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1630 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1632 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1633 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1635 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1636 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1637 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1638 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1639 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1640 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1641 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1642 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1643 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1644 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1645 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1646 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1647 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1648 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1649 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1650 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1651 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1652 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1653 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1654 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1655 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1656 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1657 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1658 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1659 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1660 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1661 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1662 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1663 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1664 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1665 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1666 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1667 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1668 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1669 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1674 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1675 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1676 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1686 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1688 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1689 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1690 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1696 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1710 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1711 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1737 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1738 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1826 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1854 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1965 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1967 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1997 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2001 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2003 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2006 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2060 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2161 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2162 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2164 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2171 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2172 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2216 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2228 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2246 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2250 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2258 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2289 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2309 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2328 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2363 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2364 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2387 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2394 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2396 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2948 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3396 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3397 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3398 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3399 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3400 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3401 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3402 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3407 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3423 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3424 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:3425 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0148 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1046 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 | Exploit, Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://nvidia.custhelp.com/app/answers/detail/a_id/4787 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 | Patch, Third Party Advisory, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Jun/36 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20180521-0001/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX235225 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3651-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3652-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3653-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3653-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3654-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3654-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3655-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3655-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3679-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3680-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3756-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3777-3/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4210 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4273 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44695/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/180049 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/support/security/Synology_SA_18_23 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ncas/alerts/TA18-141A | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | atom_c | c2308 | |
| intel | atom_c | c3308 | |
| intel | atom_c | c3338 | |
| intel | atom_c | c3508 | |
| intel | atom_c | c3538 | |
| intel | atom_c | c3558 | |
| intel | atom_c | c3708 | |
| intel | atom_c | c3750 | |
| intel | atom_c | c3758 | |
| intel | atom_c | c3808 | |
| intel | atom_c | c3830 | |
| intel | atom_c | c3850 | |
| intel | atom_c | c3858 | |
| intel | atom_c | c3950 | |
| intel | atom_c | c3955 | |
| intel | atom_c | c3958 | |
| intel | atom_e | e3805 | |
| intel | atom_e | e3815 | |
| intel | atom_e | e3825 | |
| intel | atom_e | e3826 | |
| intel | atom_e | e3827 | |
| intel | atom_e | e3845 | |
| intel | atom_x5-e3930 | - | |
| intel | atom_x5-e3940 | - | |
| intel | atom_x7-e3950 | - | |
| intel | atom_z | z2420 | |
| intel | atom_z | z2460 | |
| intel | atom_z | z2480 | |
| intel | atom_z | z2520 | |
| intel | atom_z | z2560 | |
| intel | atom_z | z2580 | |
| intel | atom_z | z2760 | |
| intel | atom_z | z3460 | |
| intel | atom_z | z3480 | |
| intel | atom_z | z3530 | |
| intel | atom_z | z3560 | |
| intel | atom_z | z3570 | |
| intel | atom_z | z3580 | |
| intel | atom_z | z3590 | |
| intel | atom_z | z3735d | |
| intel | atom_z | z3735e | |
| intel | atom_z | z3735f | |
| intel | atom_z | z3735g | |
| intel | atom_z | z3736f | |
| intel | atom_z | z3736g | |
| intel | atom_z | z3740 | |
| intel | atom_z | z3740d | |
| intel | atom_z | z3745 | |
| intel | atom_z | z3745d | |
| intel | atom_z | z3770 | |
| intel | atom_z | z3770d | |
| intel | atom_z | z3775 | |
| intel | atom_z | z3775d | |
| intel | atom_z | z3785 | |
| intel | atom_z | z3795 | |
| intel | celeron_j | j3455 | |
| intel | celeron_j | j4005 | |
| intel | celeron_j | j4105 | |
| intel | celeron_n | n3450 | |
| intel | core_i3 | 32nm | |
| intel | core_i3 | 45nm | |
| intel | core_i5 | 32nm | |
| intel | core_i5 | 45nm | |
| intel | core_i7 | 32nm | |
| intel | core_i7 | 45nm | |
| intel | core_m | 32nm | |
| intel | core_m | 45nm | |
| intel | pentium | n4000 | |
| intel | pentium | n4100 | |
| intel | pentium | n4200 | |
| intel | pentium_j | j4205 | |
| intel | pentium_silver | j5005 | |
| intel | pentium_silver | n5000 | |
| intel | xeon_e-1105c | - | |
| intel | xeon_e3 | 125c_ | |
| intel | xeon_e3 | 1220_ | |
| intel | xeon_e3 | 1275_ | |
| intel | xeon_e3 | 1505m_v6 | |
| intel | xeon_e3 | 1515m_v5 | |
| intel | xeon_e3 | 1535m_v5 | |
| intel | xeon_e3 | 1535m_v6 | |
| intel | xeon_e3 | 1545m_v5 | |
| intel | xeon_e3 | 1558l_v5 | |
| intel | xeon_e3 | 1565l_v5 | |
| intel | xeon_e3 | 1575m_v5 | |
| intel | xeon_e3 | 1578l_v5 | |
| intel | xeon_e3 | 1585_v5 | |
| intel | xeon_e3 | 1585l_v5 | |
| intel | xeon_e3 | 3600 | |
| intel | xeon_e3 | 5600 | |
| intel | xeon_e3 | 7500 | |
| intel | xeon_e3 | e5502 | |
| intel | xeon_e3 | e5503 | |
| intel | xeon_e3 | e5504 | |
| intel | xeon_e3 | e5506 | |
| intel | xeon_e3 | e5507 | |
| intel | xeon_e3 | e5520 | |
| intel | xeon_e3 | e5530 | |
| intel | xeon_e3 | e5540 | |
| intel | xeon_e3 | e6510 | |
| intel | xeon_e3 | e6540 | |
| intel | xeon_e3 | e6550 | |
| intel | xeon_e3 | l3403 | |
| intel | xeon_e3 | l3406 | |
| intel | xeon_e3 | l3426 | |
| intel | xeon_e3 | l5506 | |
| intel | xeon_e3 | l5508_ | |
| intel | xeon_e3 | l5518_ | |
| intel | xeon_e3 | l5520 | |
| intel | xeon_e3 | l5530 | |
| intel | xeon_e3 | w5580 | |
| intel | xeon_e3 | w5590 | |
| intel | xeon_e3 | x3430 | |
| intel | xeon_e3 | x3440 | |
| intel | xeon_e3 | x3450 | |
| intel | xeon_e3 | x3460 | |
| intel | xeon_e3 | x3470 | |
| intel | xeon_e3 | x3480 | |
| intel | xeon_e3 | x5550 | |
| intel | xeon_e3 | x5560 | |
| intel | xeon_e3 | x5570 | |
| intel | xeon_e3_1105c_v2 | - | |
| intel | xeon_e3_1125c_v2 | - | |
| intel | xeon_e3_1220_v2 | - | |
| intel | xeon_e3_1220_v3 | - | |
| intel | xeon_e3_1220_v5 | - | |
| intel | xeon_e3_1220_v6 | - | |
| intel | xeon_e3_12201 | - | |
| intel | xeon_e3_12201_v2 | - | |
| intel | xeon_e3_1220l_v3 | - | |
| intel | xeon_e3_1225 | - | |
| intel | xeon_e3_1225_v2 | - | |
| intel | xeon_e3_1225_v3 | - | |
| intel | xeon_e3_1225_v5 | - | |
| intel | xeon_e3_1225_v6 | - | |
| intel | xeon_e3_1226_v3 | - | |
| intel | xeon_e3_1230 | - | |
| intel | xeon_e3_1230_v2 | - | |
| intel | xeon_e3_1230_v3 | - | |
| intel | xeon_e3_1230_v5 | - | |
| intel | xeon_e3_1230_v6 | - | |
| intel | xeon_e3_1230l_v3 | - | |
| intel | xeon_e3_1231_v3 | - | |
| intel | xeon_e3_1235 | - | |
| intel | xeon_e3_1235l_v5 | - | |
| intel | xeon_e3_1240 | - | |
| intel | xeon_e3_1240_v2 | - | |
| intel | xeon_e3_1240_v3 | - | |
| intel | xeon_e3_1240_v5 | - | |
| intel | xeon_e3_1240_v6 | - | |
| intel | xeon_e3_1240l_v3 | - | |
| intel | xeon_e3_1240l_v5 | - | |
| intel | xeon_e3_1241_v3 | - | |
| intel | xeon_e3_1245 | - | |
| intel | xeon_e3_1245_v2 | - | |
| intel | xeon_e3_1245_v3 | - | |
| intel | xeon_e3_1245_v5 | - | |
| intel | xeon_e3_1245_v6 | - | |
| intel | xeon_e3_1246_v3 | - | |
| intel | xeon_e3_1258l_v4 | - | |
| intel | xeon_e3_1260l | - | |
| intel | xeon_e3_1260l_v5 | - | |
| intel | xeon_e3_1265l_v2 | - | |
| intel | xeon_e3_1265l_v3 | - | |
| intel | xeon_e3_1265l_v4 | - | |
| intel | xeon_e3_1268l_v3 | - | |
| intel | xeon_e3_1268l_v5 | - | |
| intel | xeon_e3_1270 | - | |
| intel | xeon_e3_1270_v2 | - | |
| intel | xeon_e3_1270_v3 | - | |
| intel | xeon_e3_1270_v5 | - | |
| intel | xeon_e3_1270_v6 | - | |
| intel | xeon_e3_1271_v3 | - | |
| intel | xeon_e3_1275_v2 | - | |
| intel | xeon_e3_1275_v3 | - | |
| intel | xeon_e3_1275_v5 | - | |
| intel | xeon_e3_1275_v6 | - | |
| intel | xeon_e3_1275l_v3 | - | |
| intel | xeon_e3_1276_v3 | - | |
| intel | xeon_e3_1278l_v4 | - | |
| intel | xeon_e3_1280 | - | |
| intel | xeon_e3_1280_v2 | - | |
| intel | xeon_e3_1280_v3 | - | |
| intel | xeon_e3_1280_v5 | - | |
| intel | xeon_e3_1280_v6 | - | |
| intel | xeon_e3_1281_v3 | - | |
| intel | xeon_e3_1285_v3 | - | |
| intel | xeon_e3_1285_v4 | - | |
| intel | xeon_e3_1285_v6 | - | |
| intel | xeon_e3_1285l_v3 | - | |
| intel | xeon_e3_1285l_v4 | - | |
| intel | xeon_e3_1286_v3 | - | |
| intel | xeon_e3_1286l_v3 | - | |
| intel | xeon_e3_1290 | - | |
| intel | xeon_e3_1290_v2 | - | |
| intel | xeon_e3_1501l_v6 | - | |
| intel | xeon_e3_1501m_v6 | - | |
| intel | xeon_e3_1505l_v5 | - | |
| intel | xeon_e3_1505l_v6 | - | |
| intel | xeon_e3_1505m_v5 | - | |
| intel | xeon_e5 | 2650l_v4 | |
| intel | xeon_e5 | 2658 | |
| intel | xeon_e5 | 2658_v2 | |
| intel | xeon_e5 | 2658_v3 | |
| intel | xeon_e5 | 2658_v4 | |
| intel | xeon_e5 | 2658a_v3 | |
| intel | xeon_e5 | 2660 | |
| intel | xeon_e5 | 2660_v2 | |
| intel | xeon_e5 | 2660_v3 | |
| intel | xeon_e5 | 2660_v4 | |
| intel | xeon_e5 | 2665 | |
| intel | xeon_e5 | 2667 | |
| intel | xeon_e5 | 2667_v2 | |
| intel | xeon_e5 | 2667_v3 | |
| intel | xeon_e5 | 2667_v4 | |
| intel | xeon_e5 | 2670 | |
| intel | xeon_e5 | 2670_v2 | |
| intel | xeon_e5 | 2670_v3 | |
| intel | xeon_e5 | 2680 | |
| intel | xeon_e5 | 2680_v2 | |
| intel | xeon_e5 | 2680_v3 | |
| intel | xeon_e5 | 2680_v4 | |
| intel | xeon_e5 | 2683_v3 | |
| intel | xeon_e5 | 2683_v4 | |
| intel | xeon_e5 | 2687w | |
| intel | xeon_e5 | 2687w_v2 | |
| intel | xeon_e5 | 2687w_v3 | |
| intel | xeon_e5 | 2687w_v4 | |
| intel | xeon_e5 | 2690 | |
| intel | xeon_e5 | 2690_v2 | |
| intel | xeon_e5 | 2690_v3 | |
| intel | xeon_e5 | 2690_v4 | |
| intel | xeon_e5 | 2695_v2 | |
| intel | xeon_e5 | 2695_v3 | |
| intel | xeon_e5 | 2695_v4 | |
| intel | xeon_e5 | 2697_v2 | |
| intel | xeon_e5 | 2697_v3 | |
| intel | xeon_e5 | 2697_v4 | |
| intel | xeon_e5 | 2697a_v4 | |
| intel | xeon_e5 | 2698_v3 | |
| intel | xeon_e5 | 2698_v4 | |
| intel | xeon_e5 | 2699_v3 | |
| intel | xeon_e5 | 2699_v4 | |
| intel | xeon_e5 | 2699a_v4 | |
| intel | xeon_e5 | 2699r_v4 | |
| intel | xeon_e5 | 4603 | |
| intel | xeon_e5 | 4603_v2 | |
| intel | xeon_e5 | 4607 | |
| intel | xeon_e5 | 4607_v2 | |
| intel | xeon_e5 | 4610 | |
| intel | xeon_e5 | 4610_v2 | |
| intel | xeon_e5 | 4610_v3 | |
| intel | xeon_e5 | 4610_v4 | |
| intel | xeon_e5 | 4617 | |
| intel | xeon_e5 | 4620 | |
| intel | xeon_e5 | 4620_v2 | |
| intel | xeon_e5 | 4620_v3 | |
| intel | xeon_e5 | 4620_v4 | |
| intel | xeon_e5 | 4624l_v2 | |
| intel | xeon_e5 | 4627_v2 | |
| intel | xeon_e5 | 4627_v3 | |
| intel | xeon_e5 | 4627_v4 | |
| intel | xeon_e5 | 4628l_v4 | |
| intel | xeon_e5 | 4640 | |
| intel | xeon_e5 | 4640_v2 | |
| intel | xeon_e5 | 4640_v3 | |
| intel | xeon_e5 | 4640_v4 | |
| intel | xeon_e5 | 4648_v3 | |
| intel | xeon_e5 | 4650 | |
| intel | xeon_e5 | 4650_v2 | |
| intel | xeon_e5 | 4650_v3 | |
| intel | xeon_e5 | 4650_v4 | |
| intel | xeon_e5 | 4650l | |
| intel | xeon_e5 | 4655_v3 | |
| intel | xeon_e5 | 4655_v4 | |
| intel | xeon_e5 | 4657l_v2 | |
| intel | xeon_e5 | 4660_v3 | |
| intel | xeon_e5 | 4660_v4 | |
| intel | xeon_e5 | 4667_v3 | |
| intel | xeon_e5 | 4667_v4 | |
| intel | xeon_e5 | 4669_v3 | |
| intel | xeon_e5 | 4669_v4 | |
| intel | xeon_e5_1428l | - | |
| intel | xeon_e5_1428l_v2 | - | |
| intel | xeon_e5_1428l_v3 | - | |
| intel | xeon_e5_1620 | - | |
| intel | xeon_e5_1620_v2 | - | |
| intel | xeon_e5_1620_v3 | - | |
| intel | xeon_e5_1620_v4 | - | |
| intel | xeon_e5_1630_v3 | - | |
| intel | xeon_e5_1630_v4 | - | |
| intel | xeon_e5_1650 | - | |
| intel | xeon_e5_1650_v2 | - | |
| intel | xeon_e5_1650_v3 | - | |
| intel | xeon_e5_1650_v4 | - | |
| intel | xeon_e5_1660 | - | |
| intel | xeon_e5_1660_v2 | - | |
| intel | xeon_e5_1660_v3 | - | |
| intel | xeon_e5_1660_v4 | - | |
| intel | xeon_e5_1680_v3 | - | |
| intel | xeon_e5_1680_v4 | - | |
| intel | xeon_e5_2403 | - | |
| intel | xeon_e5_2403_v2 | - | |
| intel | xeon_e5_2407 | - | |
| intel | xeon_e5_2407_v2 | - | |
| intel | xeon_e5_2408l_v3 | - | |
| intel | xeon_e5_2418l | - | |
| intel | xeon_e5_2418l_v2 | - | |
| intel | xeon_e5_2418l_v3 | - | |
| intel | xeon_e5_2420 | - | |
| intel | xeon_e5_2420_v2 | - | |
| intel | xeon_e5_2428l | - | |
| intel | xeon_e5_2428l_v2 | - | |
| intel | xeon_e5_2428l_v3 | - | |
| intel | xeon_e5_2430 | - | |
| intel | xeon_e5_2430_v2 | - | |
| intel | xeon_e5_2430l | - | |
| intel | xeon_e5_2430l_v2 | - | |
| intel | xeon_e5_2438l_v3 | - | |
| intel | xeon_e5_2440 | - | |
| intel | xeon_e5_2440_v2 | - | |
| intel | xeon_e5_2448l | - | |
| intel | xeon_e5_2448l_v2 | - | |
| intel | xeon_e5_2450 | - | |
| intel | xeon_e5_2450_v2 | - | |
| intel | xeon_e5_2450l | - | |
| intel | xeon_e5_2450l_v2 | - | |
| intel | xeon_e5_2470 | - | |
| intel | xeon_e5_2470_v2 | - | |
| intel | xeon_e5_2603 | - | |
| intel | xeon_e5_2603_v2 | - | |
| intel | xeon_e5_2603_v3 | - | |
| intel | xeon_e5_2603_v4 | - | |
| intel | xeon_e5_2608l_v3 | - | |
| intel | xeon_e5_2608l_v4 | - | |
| intel | xeon_e5_2609 | - | |
| intel | xeon_e5_2609_v2 | - | |
| intel | xeon_e5_2609_v3 | - | |
| intel | xeon_e5_2609_v4 | - | |
| intel | xeon_e5_2618l_v2 | - | |
| intel | xeon_e5_2618l_v3 | - | |
| intel | xeon_e5_2618l_v4 | - | |
| intel | xeon_e5_2620 | - | |
| intel | xeon_e5_2620_v2 | - | |
| intel | xeon_e5_2620_v3 | - | |
| intel | xeon_e5_2620_v4 | - | |
| intel | xeon_e5_2623_v3 | - | |
| intel | xeon_e5_2623_v4 | - | |
| intel | xeon_e5_2628l_v2 | - | |
| intel | xeon_e5_2628l_v3 | - | |
| intel | xeon_e5_2628l_v4 | - | |
| intel | xeon_e5_2630 | - | |
| intel | xeon_e5_2630_v2 | - | |
| intel | xeon_e5_2630_v3 | - | |
| intel | xeon_e5_2630_v4 | - | |
| intel | xeon_e5_2630l | - | |
| intel | xeon_e5_2630l_v2 | - | |
| intel | xeon_e5_2630l_v3 | - | |
| intel | xeon_e5_2630l_v4 | - | |
| intel | xeon_e5_2637 | - | |
| intel | xeon_e5_2637_v2 | - | |
| intel | xeon_e5_2637_v3 | - | |
| intel | xeon_e5_2637_v4 | - | |
| intel | xeon_e5_2640 | - | |
| intel | xeon_e5_2640_v2 | - | |
| intel | xeon_e5_2640_v3 | - | |
| intel | xeon_e5_2640_v4 | - | |
| intel | xeon_e5_2643 | - | |
| intel | xeon_e5_2643_v2 | - | |
| intel | xeon_e5_2643_v3 | - | |
| intel | xeon_e5_2643_v4 | - | |
| intel | xeon_e5_2648l | - | |
| intel | xeon_e5_2648l_v2 | - | |
| intel | xeon_e5_2648l_v3 | - | |
| intel | xeon_e5_2648l_v4 | - | |
| intel | xeon_e5_2650 | - | |
| intel | xeon_e5_2650_v2 | - | |
| intel | xeon_e5_2650_v3 | - | |
| intel | xeon_e5_2650_v4 | - | |
| intel | xeon_e5_2650l | - | |
| intel | xeon_e5_2650l_v2 | - | |
| intel | xeon_e5_2650l_v3 | - | |
| intel | xeon_e7 | 2803 | |
| intel | xeon_e7 | 2820 | |
| intel | xeon_e7 | 2830 | |
| intel | xeon_e7 | 2850 | |
| intel | xeon_e7 | 2850_v2 | |
| intel | xeon_e7 | 2860 | |
| intel | xeon_e7 | 2870 | |
| intel | xeon_e7 | 2870_v2 | |
| intel | xeon_e7 | 2880_v2 | |
| intel | xeon_e7 | 2890_v2 | |
| intel | xeon_e7 | 4807 | |
| intel | xeon_e7 | 4809_v2 | |
| intel | xeon_e7 | 4809_v3 | |
| intel | xeon_e7 | 4809_v4 | |
| intel | xeon_e7 | 4820 | |
| intel | xeon_e7 | 4820_v2 | |
| intel | xeon_e7 | 4820_v3 | |
| intel | xeon_e7 | 4820_v4 | |
| intel | xeon_e7 | 4830 | |
| intel | xeon_e7 | 4830_v2 | |
| intel | xeon_e7 | 4830_v3 | |
| intel | xeon_e7 | 4830_v4 | |
| intel | xeon_e7 | 4850 | |
| intel | xeon_e7 | 4850_v2 | |
| intel | xeon_e7 | 4850_v3 | |
| intel | xeon_e7 | 4850_v4 | |
| intel | xeon_e7 | 4860 | |
| intel | xeon_e7 | 4860_v2 | |
| intel | xeon_e7 | 4870 | |
| intel | xeon_e7 | 4870_v2 | |
| intel | xeon_e7 | 4880_v2 | |
| intel | xeon_e7 | 4890_v2 | |
| intel | xeon_e7 | 8830 | |
| intel | xeon_e7 | 8837 | |
| intel | xeon_e7 | 8850 | |
| intel | xeon_e7 | 8850_v2 | |
| intel | xeon_e7 | 8857_v2 | |
| intel | xeon_e7 | 8860 | |
| intel | xeon_e7 | 8860_v3 | |
| intel | xeon_e7 | 8860_v4 | |
| intel | xeon_e7 | 8867_v3 | |
| intel | xeon_e7 | 8867_v4 | |
| intel | xeon_e7 | 8867l | |
| intel | xeon_e7 | 8870 | |
| intel | xeon_e7 | 8870_v2 | |
| intel | xeon_e7 | 8870_v3 | |
| intel | xeon_e7 | 8870_v4 | |
| intel | xeon_e7 | 8880_v2 | |
| intel | xeon_e7 | 8880_v3 | |
| intel | xeon_e7 | 8880_v4 | |
| intel | xeon_e7 | 8880l_v2 | |
| intel | xeon_e7 | 8880l_v3 | |
| intel | xeon_e7 | 8890_v2 | |
| intel | xeon_e7 | 8890_v3 | |
| intel | xeon_e7 | 8890_v4 | |
| intel | xeon_e7 | 8891_v2 | |
| intel | xeon_e7 | 8891_v3 | |
| intel | xeon_e7 | 8891_v4 | |
| intel | xeon_e7 | 8893_v2 | |
| intel | xeon_e7 | 8893_v3 | |
| intel | xeon_e7 | 8893_v4 | |
| intel | xeon_e7 | 8894_v4 | |
| intel | xeon_gold | 5115 | |
| intel | xeon_gold | 85115 | |
| intel | xeon_gold | 85118 | |
| intel | xeon_gold | 85119t | |
| intel | xeon_gold | 85120 | |
| intel | xeon_gold | 85120t | |
| intel | xeon_gold | 85122 | |
| intel | xeon_gold | 86126 | |
| intel | xeon_gold | 86126f | |
| intel | xeon_gold | 86126t | |
| intel | xeon_gold | 86128 | |
| intel | xeon_gold | 86130 | |
| intel | xeon_gold | 86130f | |
| intel | xeon_gold | 86130t | |
| intel | xeon_gold | 86132 | |
| intel | xeon_gold | 86134 | |
| intel | xeon_gold | 86134m | |
| intel | xeon_gold | 86136 | |
| intel | xeon_gold | 86138 | |
| intel | xeon_gold | 86138f | |
| intel | xeon_gold | 86138t | |
| intel | xeon_gold | 86140 | |
| intel | xeon_gold | 86140m | |
| intel | xeon_gold | 86142 | |
| intel | xeon_gold | 86142f | |
| intel | xeon_gold | 86142m | |
| intel | xeon_gold | 86144 | |
| intel | xeon_gold | 86146 | |
| intel | xeon_gold | 86148 | |
| intel | xeon_gold | 86148f | |
| intel | xeon_gold | 86150 | |
| intel | xeon_gold | 86152 | |
| intel | xeon_gold | 86154 | |
| intel | xeon_platinum | 8153 | |
| intel | xeon_platinum | 8156 | |
| intel | xeon_platinum | 8158 | |
| intel | xeon_platinum | 8160 | |
| intel | xeon_platinum | 8160f | |
| intel | xeon_platinum | 8160m | |
| intel | xeon_platinum | 8160t | |
| intel | xeon_platinum | 8164 | |
| intel | xeon_platinum | 8168 | |
| intel | xeon_platinum | 8170 | |
| intel | xeon_platinum | 8170m | |
| intel | xeon_platinum | 8176 | |
| intel | xeon_platinum | 8176f | |
| intel | xeon_platinum | 8176m | |
| intel | xeon_platinum | 8180 | |
| intel | xeon_silver | 4108 | |
| intel | xeon_silver | 4109t | |
| intel | xeon_silver | 4110 | |
| intel | xeon_silver | 4112 | |
| intel | xeon_silver | 4114 | |
| intel | xeon_silver | 4114t | |
| intel | xeon_silver | 4116 | |
| intel | xeon_silver | 4116t | |
| arm | cortex-a | 15 | |
| arm | cortex-a | 57 | |
| arm | cortex-a | 72 | |
| redhat | mrg_realtime | 2.0 | |
| redhat | openstack | 7.0 | |
| redhat | openstack | 8 | |
| redhat | openstack | 9 | |
| redhat | openstack | 10 | |
| redhat | openstack | 12 | |
| redhat | openstack | 13 | |
| redhat | virtualization_manager | 4.2 | |
| redhat | virtualization_manager | 4.3 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_eus | 6.7 | |
| redhat | enterprise_linux_eus | 7.3 | |
| redhat | enterprise_linux_eus | 7.4 | |
| redhat | enterprise_linux_eus | 7.5 | |
| redhat | enterprise_linux_eus | 7.6 | |
| redhat | enterprise_linux_eus | 7.7 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 5.9 | |
| redhat | enterprise_linux_server_aus | 6.4 | |
| redhat | enterprise_linux_server_aus | 6.5 | |
| redhat | enterprise_linux_server_aus | 6.6 | |
| redhat | enterprise_linux_server_aus | 7.2 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_tus | 6.6 | |
| redhat | enterprise_linux_server_tus | 7.2 | |
| redhat | enterprise_linux_server_tus | 7.3 | |
| redhat | enterprise_linux_server_tus | 7.4 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 17.10 | |
| canonical | ubuntu_linux | 18.04 | |
| siemens | itc1500_firmware | * | |
| siemens | itc1500 | 3 | |
| siemens | itc1500_pro_firmware | * | |
| siemens | itc1500_pro | 3 | |
| siemens | itc1900_firmware | * | |
| siemens | itc1900 | 3 | |
| siemens | itc1900_pro_firmware | * | |
| siemens | itc1900_pro | 3 | |
| siemens | itc2200_firmware | * | |
| siemens | itc2200 | 3 | |
| siemens | itc2200_pro_firmware | * | |
| siemens | itc2200_pro | 3 | |
| oracle | local_service_management_system | * | |
| oracle | solaris | 11 | |
| siemens | ruggedcom_ape_firmware | - | |
| siemens | ruggedcom_ape | - | |
| siemens | simatic_et_200_sp_firmware | * | |
| siemens | simatic_et_200_sp | - | |
| siemens | simatic_field_pg_m4_firmware | * | |
| siemens | simatic_field_pg_m4 | - | |
| siemens | simatic_field_pg_m5_firmware | * | |
| siemens | simatic_field_pg_m5 | - | |
| siemens | simatic_ipc3000_smart_firmware | * | |
| siemens | simatic_ipc3000_smart | 2 | |
| siemens | simatic_ipc347e_firmware | * | |
| siemens | simatic_ipc347e | - | |
| siemens | simatic_ipc427c_firmware | - | |
| siemens | simatic_ipc427c | - | |
| siemens | simatic_ipc427d_firmware | * | |
| siemens | simatic_ipc427d | - | |
| siemens | simatic_ipc427e_firmware | * | |
| siemens | simatic_ipc427e | - | |
| siemens | simatic_ipc477c_firmware | - | |
| siemens | simatic_ipc477c | - | |
| siemens | simatic_ipc477d_firmware | * | |
| siemens | simatic_ipc477d | - | |
| siemens | simatic_ipc477e_firmware | * | |
| siemens | simatic_ipc477e | - | |
| siemens | simatic_ipc477e_pro_firmware | * | |
| siemens | simatic_ipc477e_pro | - | |
| siemens | simatic_ipc547e_firmware | * | |
| siemens | simatic_ipc547e | - | |
| siemens | simatic_ipc547g_firmware | * | |
| siemens | simatic_ipc547g | - | |
| siemens | simatic_ipc627c_firmware | * | |
| siemens | simatic_ipc627c | - | |
| siemens | simatic_ipc627d_firmware | * | |
| siemens | simatic_ipc627d | - | |
| siemens | simatic_ipc647c_firmware | * | |
| siemens | simatic_ipc647c | - | |
| siemens | simatic_ipc647d_firmware | * | |
| siemens | simatic_ipc647d | - | |
| siemens | simatic_ipc677d_firmware | * | |
| siemens | simatic_ipc677d | - | |
| siemens | simatic_ipc677c_firmware | * | |
| siemens | simatic_ipc677c | - | |
| siemens | simatic_ipc827c_firmware | * | |
| siemens | simatic_ipc827c | - | |
| siemens | simatic_ipc827d_firmware | * | |
| siemens | simatic_ipc827d | - | |
| siemens | simatic_ipc847c_firmware | * | |
| siemens | simatic_ipc847c | - | |
| siemens | simatic_ipc847d_firmware | * | |
| siemens | simatic_ipc847d | - | |
| siemens | simatic_itp1000_firmware | * | |
| siemens | simatic_itp1000 | - | |
| siemens | simatic_s7-1500_firmware | * | |
| siemens | simatic_s7-1500 | - | |
| siemens | simotion_p320-4e_firmware | * | |
| siemens | simotion_p320-4e | - | |
| siemens | sinumerik_840_d_sl_firmware | - | |
| siemens | sinumerik_840_d_sl | - | |
| siemens | sinumerik_pcu_50.5_firmware | * | |
| siemens | sinumerik_pcu_50.5 | - | |
| siemens | sinumerik_tcu_30.3_firmware | - | |
| siemens | sinumerik_tcu_30.3 | - | |
| siemens | sinema_remote_connect_firmware | - | |
| siemens | sinema_remote_connect | - | |
| mitel | micloud_management_portal | * | |
| mitel | micollab | - | |
| mitel | mivoic_mx-one | - | |
| mitel | mivoice_5000 | - | |
| mitel | mivoice_border_gateway | - | |
| mitel | mivoice_business | - | |
| mitel | mivoice_connect | - | |
| mitel | open_integration_gateway | - | |
| sonicwall | cloud_global_management_system | - | |
| sonicwall | email_security | - | |
| sonicwall | global_management_system | - | |
| sonicwall | secure_mobile_access | - | |
| sonicwall | web_application_firewall | - | |
| sonicwall | sonicosv | - | |
| schneider-electric | struxureware_data_center_expert | * | |
| redhat | virtualization | 4.0 | |
| redhat | enterprise_linux | 7.0 | |
| nvidia | jetson_tx1 | * | |
| nvidia | jetson_tx2 | * | |
| microsoft | surface | - | |
| microsoft | surface_book | - | |
| microsoft | surface_book | 2 | |
| microsoft | surface_pro | 3 | |
| microsoft | surface_pro | 4 | |
| microsoft | surface_pro | 1796 | |
| microsoft | surface_pro_with_lte_advanced | 1807 | |
| microsoft | surface_studio | - | |
| microsoft | windows_10 | - | |
| microsoft | windows_10 | 1607 | |
| microsoft | windows_10 | 1703 | |
| microsoft | windows_10 | 1709 | |
| microsoft | windows_10 | 1803 | |
| microsoft | windows_10 | 1809 | |
| microsoft | windows_7 | - | |
| microsoft | windows_8.1 | - | |
| microsoft | windows_server_2008 | r2 | |
| microsoft | windows_server_2008 | sp2 | |
| microsoft | windows_server_2012 | - | |
| microsoft | windows_server_2012 | r2 | |
| microsoft | windows_server_2016 | - | |
| microsoft | windows_server_2016 | 1709 | |
| microsoft | windows_server_2016 | 1803 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*",
"matchCriteriaId": "50287A9B-366F-41F2-BEBD-D4C64EF93035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*",
"matchCriteriaId": "CCB79F2F-5522-45D3-A1D1-DC2F5A016D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*",
"matchCriteriaId": "9749C2B0-B919-4172-A2AD-04C99A479F5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1F45A1-A17D-4895-8A71-00010C7E55D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*",
"matchCriteriaId": "D46BF41F-C44C-4D87-862E-0D156A2298DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*",
"matchCriteriaId": "5927D78A-EE05-4246-A141-4A8815AB228B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*",
"matchCriteriaId": "579FC479-DEA0-415D-8E8F-18A81A85A471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*",
"matchCriteriaId": "CEECAA34-57F4-4B01-857C-C8454E1EDCAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*",
"matchCriteriaId": "967252A4-EC1F-4B31-97B8-8D25A3D82070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*",
"matchCriteriaId": "3205757B-07DB-4115-B3E0-4DF9D0EA2061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF8ABFA-BBFD-42F5-9769-00F8CD67F7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*",
"matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*",
"matchCriteriaId": "E9D0A534-1749-4ED3-8F18-BF826D84EB56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*",
"matchCriteriaId": "B581515E-29CC-462F-BB10-4EA6DE2D6637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*",
"matchCriteriaId": "036D395E-AFE8-4D61-91CC-E9B3CD8B6380",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*",
"matchCriteriaId": "36609915-9E0D-4204-B544-4832E1195BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*",
"matchCriteriaId": "3612AC78-4904-4830-85DF-38A38F617379",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*",
"matchCriteriaId": "B79CC0FA-3DA1-4812-8E73-B0FF0752E31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*",
"matchCriteriaId": "D12F3759-48D2-4208-AD5B-3AC8B012D061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C61D9B-2733-4A67-9D6A-2290123C0405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*",
"matchCriteriaId": "44C3C383-6927-44AD-9488-8B916D5959ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC1E41C-7A17-42B7-936D-09A236D9C4D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*",
"matchCriteriaId": "E814CB3E-4542-4E3E-91E8-D97EA17C0B1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD43D7C-932B-463F-8EB2-3A115FBED4BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*",
"matchCriteriaId": "9CCD70F8-D81D-467B-8042-5D3B9AC513E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*",
"matchCriteriaId": "D05C68D0-4771-4338-9761-6428195F0318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FC2878-389F-4687-8377-E192A1C519BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*",
"matchCriteriaId": "4B24CEBE-51B1-4EC5-8770-BFDB0625193A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*",
"matchCriteriaId": "61BD85A8-39D9-4248-96FE-CAEF4BC7CD44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*",
"matchCriteriaId": "8320D28B-B10D-47AE-9B65-51304F93F9AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*",
"matchCriteriaId": "35AD843A-EBB1-42BE-A305-595C23881404",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*",
"matchCriteriaId": "0D457B8B-50A6-411C-8528-96915B697C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*",
"matchCriteriaId": "3934C421-BD11-4174-83F4-3E20176F03F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*",
"matchCriteriaId": "45EE1BA7-5356-4421-9CF2-48DA09EBAE3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*",
"matchCriteriaId": "92FE452A-EE8B-4ACE-96B1-B6BD81FAC9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*",
"matchCriteriaId": "47195FE7-3692-42C4-B29E-679A6FE0E220",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*",
"matchCriteriaId": "C033BBFA-67F4-4F24-A042-FF996B327976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF7A770-3E90-4466-8595-8E523D82BC62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*",
"matchCriteriaId": "FA7922C0-AB84-4331-BE8F-71A0D95D4F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*",
"matchCriteriaId": "648CB034-89BF-48FF-A3BF-C84C08FE09E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*",
"matchCriteriaId": "2A7DC164-65FF-483A-AD69-3E23E449E52C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3DCB95-5139-44C6-8151-8CEFD37F9DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5FEA46-49A2-4082-98D2-56E698A56909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*",
"matchCriteriaId": "0B85D7F3-1FA5-4FE1-AAFF-CEE8DF822CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*",
"matchCriteriaId": "80607FEB-8908-40F6-B702-FD56D849E2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*",
"matchCriteriaId": "97F20575-82C0-466D-8FDD-AAC034247D0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*",
"matchCriteriaId": "648E21A8-6B5F-4C97-A71A-44B97DBB4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*",
"matchCriteriaId": "172EA906-A08F-4D2A-9814-937C07F77C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*",
"matchCriteriaId": "9DB6A2ED-D433-4A8E-8044-02571D0BBD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*",
"matchCriteriaId": "4F819519-61B6-4ED0-8A23-509D6B26ACE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D81C40-4BD0-4D25-95B4-44BE2011F117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*",
"matchCriteriaId": "85C3A39E-29D3-4C02-89A6-D5B3475EF592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*",
"matchCriteriaId": "C70340A2-71DC-4D4D-BA2E-2B2E9ACDBE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*",
"matchCriteriaId": "586DB792-9FF6-4253-9DAE-F3ACA3F1C489",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*",
"matchCriteriaId": "330576E9-3A92-4E22-BBC0-94A12ACE1032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*",
"matchCriteriaId": "5C644430-A075-40E1-8E35-15B97D8E9078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC094AC-0A3A-43F3-823A-089235D04A7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*",
"matchCriteriaId": "5835FB20-922D-4478-8E4B-A53CCEE46198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*",
"matchCriteriaId": "667A34BF-8699-477D-B30A-CEF0A36FC81B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*",
"matchCriteriaId": "FE586938-ED60-40EA-8177-30267C7A3E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*",
"matchCriteriaId": "CF902C36-0708-4B93-9504-5EA7EEDD628F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*",
"matchCriteriaId": "F0BC5EBB-2F1A-45C4-A8A7-122FBE4CBC93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*",
"matchCriteriaId": "795F5800-8C06-426B-80AA-20F8E402ACAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*",
"matchCriteriaId": "173E49AF-95A9-4DAE-8C74-13CFCA8F0726",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE96391-4F25-4505-B757-D1F15ABD9FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*",
"matchCriteriaId": "D037E4BA-35B9-42CB-9DDE-BED3DF49B958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*",
"matchCriteriaId": "43288516-FA4D-4D8F-9E69-EA27115EB43B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*",
"matchCriteriaId": "13EF19E9-FE9A-4ED7-8D9E-848F10C088B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB72D0E-0E34-4EF3-98FB-52BE4A135D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDE7F94-D938-40BA-A1F6-CE52D0B74ECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E39247-337C-49D1-BF1B-504F2DA4EBA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*",
"matchCriteriaId": "A45FA7CB-6523-4042-8832-193D87102F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*",
"matchCriteriaId": "61E350A6-9EC7-4E14-9790-040F154CE15D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*",
"matchCriteriaId": "A8D70B4E-6B85-459C-AACA-59AB5CCC0B38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*",
"matchCriteriaId": "565EB5E9-3B86-4353-BFF6-3F5D27140B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*",
"matchCriteriaId": "A32CBB5D-392A-4CD1-82D3-A97D822FADFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*",
"matchCriteriaId": "383E08FE-EE7A-4E41-9AAD-786779D4B5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*",
"matchCriteriaId": "2D50C6D5-3452-4214-B3FF-9F8009D75C3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*",
"matchCriteriaId": "A93954C6-9B01-4CEB-8925-5D3F415AFC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7D54E5-6EDE-44DE-AEA6-F7F76E3EC36F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
"matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
"matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
"matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DAA72A4-AC7D-4544-89D4-5B07961D5A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B8C725-34CF-4340-BE7B-37E58CF706D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"matchCriteriaId": "F40C26BE-56CB-4022-A1D8-3CA0A8F87F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4AC996-B340-4A14-86F7-FF83B4D5EC8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E938A8EB-68FE-427B-B67E-C880FBF54BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA1A18F-D997-4121-A01B-FD9B3BF266CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3EFED2-F6BC-46D9-AB22-D5ED87EF4549",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC8E8CF-2507-49DE-BF54-CCF16A2861F5",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*",
"matchCriteriaId": "742BCB01-8856-4F6F-86B6-A1DB878C3062",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5178C320-CDB7-4180-951B-BFBCFAFB7FAA",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE4079D-C47A-4D57-9B37-947DE42F8A60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1F645D-141D-4BCB-8F90-4A7BCC08988B",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*",
"matchCriteriaId": "B203F60B-0694-4B46-96CB-E8C5E4375E85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F702CAFB-3ED9-4185-9781-1DAA8A0B01DD",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C231846-D2BC-428F-AADE-A7E09DB3A547",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA817DF-52C1-4FCC-A661-F81D923A18EF",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*",
"matchCriteriaId": "D00016F2-3E88-4F57-AD2B-378153E73956",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B30A4009-B0DD-492E-AEC1-985261707AC3",
"versionEndExcluding": "3.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4ED0315-9898-4110-96AB-5C198357ED83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E49B728-E8DE-4B23-9564-7BFDED6F299E",
"versionEndIncluding": "13.3",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48B6FA71-3077-4202-A9A1-CBDF9AE2521E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E4F2A68-3715-4F86-BEEC-8C4D4341B100",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B42251AC-8FED-4BDE-93B3-5203F32D6313",
"versionEndExcluding": "2.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A661231-49DF-477F-954A-702839A9266B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAD5D20-80DB-4A09-AFBA-BCA594DE3B93",
"versionEndExcluding": "18.01.09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33",
"versionEndExcluding": "22.01.06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "664FC58B-33E9-43E4-A87E-5C78F935C332",
"versionEndExcluding": "1.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*",
"matchCriteriaId": "4809A582-BC22-41A0-815A-32CF2BA197F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45509778-898E-45DF-B14E-68B6C456B9B6",
"versionEndExcluding": "1.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49D276DE-950F-4A61-BA13-DD5D07A17571",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AB7B8D-D6FB-43A0-865D-58D4CDF96C06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA7336B-85CA-4A15-B7A6-D20B67041CCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA3B550-EB8B-4EBB-A1F0-14152A6791DD",
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0",
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D55FC2D5-DCF6-4A24-873F-D0CF80DB3921",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4335E3-D2BB-4465-BBC8-611C7F85BEF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "435F7F3C-7483-4101-BC0A-E1E2BB66D6C1",
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78",
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "224D0968-6414-41F7-8929-C69D524A416F",
"versionEndExcluding": "21.01.09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E",
"versionEndExcluding": "r1.30.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "940CCA5A-EC4A-4D46-B56C-4FC3698707E0",
"versionEndExcluding": "r1.23.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "203B30DB-52C6-48ED-8A94-76F775DA1198",
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A",
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05466B50-76ED-41E7-87DC-96CA95AAC6A2",
"versionEndExcluding": "15.01.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917",
"versionEndExcluding": "19.01.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729",
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F232B7B4-D633-47ED-B435-6EB6530019F4",
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0D4DB3-FBA2-4868-8A38-5D81E622C709",
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE",
"versionEndExcluding": "19.02.11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8014E0E5-F880-4886-8294-7EC971D5BBF9",
"versionEndExcluding": "15.01.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53",
"versionEndExcluding": "19.01.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC",
"versionEndExcluding": "23.01.04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F41D-480F-4443-927E-00607DD40BF5",
"versionEndExcluding": "2.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30DDEA9B-E1BF-4572-8E12-D13C54603E77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8102F17-F6DA-4EE9-B533-EA806D9E7F7E",
"versionEndExcluding": "17.0x.14",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EE09494-625A-4FF7-8B3E-6510FF9AFC9C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8095A5-3677-4024-9437-C46DA382C280",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9565FE15-A705-4D0A-BFA3-30871FDCF9DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E16526D-CCA8-45B2-829E-4562A7440356",
"versionEndExcluding": "15.02.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9220E9B5-5A0E-4F90-9A2C-B4692E937DBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE42ABA9-E5D8-4589-B111-AE191747E03D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E53E94C-0F57-4A71-B919-C34984A5ADB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2051E518-7CCD-4B49-9705-BDDC37177BE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF739F2D-744A-44CE-8DA7-F89A14239943",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "417953F8-F722-4CD0-BC59-1192A4533505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61E87F32-4157-42A3-A758-36AA2A4D7AFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CEABF0C-99D9-415D-B8CB-B632C644664E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "150C225A-C4A0-4CC7-91AA-8F341D8152F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*",
"matchCriteriaId": "762B1578-25AD-4ACC-A1AE-C325155F49F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E561C59C-9E46-4FE1-8DA7-5E524FB9D87E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1077221-796B-44E7-A278-579F41BA5DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6F3481-E5DF-452A-AE3C-1ED648B54234",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD39AA6-8D0B-405C-8A69-9264C82BCDAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD00A81-9A08-4C24-B720-BC7C99DCF19B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2008DF4A-1AC8-4CC0-8649-823B3B6BD329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD3D92A-D07F-4087-81AF-0FA78E290DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0220EB54-D74B-451C-8FA6-D71BF39B578F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED1C215-1656-4113-B571-9479FDEB9ACF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CB56955-1A47-4F6C-A354-8BBAE7534504",
"versionEndExcluding": "7.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D05993AD-FABF-49A6-B3F5-6DF1B0835321",
"versionEndExcluding": "r28.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1455BBEB-871A-41FE-A4BD-6DC583777252",
"versionEndExcluding": "r28.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC248D3F-1D6D-48FC-94BA-3C24A182D172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*",
"matchCriteriaId": "987ECFC7-D504-488D-B977-FEC182819567",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*",
"matchCriteriaId": "F75F0910-3EED-4365-B03E-B3295A762656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*",
"matchCriteriaId": "12C0B9FE-09FD-4991-BE14-499FFC728EDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*",
"matchCriteriaId": "7585B88F-58FA-4DF2-AA99-185731253A05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD7F77C-F02B-4EAF-8836-C97ACB5AFEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*",
"matchCriteriaId": "A98AB09C-24D8-4B58-9F4A-EF6B42EB27C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF4194A-8194-4727-8C10-4F44D5041011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"matchCriteriaId": "66CAFDB7-9D41-4E67-AB83-5EB104551FF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"matchCriteriaId": "5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4."
},
{
"lang": "es",
"value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y que realizan la ejecuci\u00f3n especulativa de lecturas de memoria antes de que se conozcan las direcciones de todas las anteriores escrituras de memoria podr\u00edan permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n a un atacante con acceso de usuario local mediante un an\u00e1lisis de canal lateral. Esto tambi\u00e9n se conoce como Speculative Store Bypass (SSB), Variant 4."
}
],
"id": "CVE-2018-3639",
"lastModified": "2024-11-21T04:05:48.867",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-22T12:29:00.250",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104232"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040949"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"source": "secure@intel.com",
"tags": [
"Broken Link"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"source": "secure@intel.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"source": "secure@intel.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235225"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"source": "secure@intel.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.lenovo.com/us/en/solutions/LEN-22133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104232"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040949"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1630"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1632"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1636"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1638"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1639"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1640"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1641"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1642"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1643"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1644"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1645"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1646"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1649"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1650"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1653"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1655"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1657"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1659"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1662"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1663"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1665"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1666"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1667"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1668"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1674"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1675"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1686"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1688"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1689"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1690"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1696"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1710"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1826"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1967"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1997"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2060"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2228"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2258"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2364"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2387"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2394"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2948"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3397"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3398"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3399"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3400"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3407"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3424"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://access.redhat.com/errata/RHSA-2019:0148"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1046"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jun/36"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX235225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.synology.com/support/security/Synology_SA_18_23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA18-141A"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-203"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VAR-201805-0963
Vulnerability from variot - Updated: 2025-12-22 21:34Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities.
For the stable distribution (stretch), these problems have been fixed in version 3.20180703.2~deb9u1.
We recommend that you upgrade your intel-microcode packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: qemu-kvm security update Advisory ID: RHSA-2018:1656-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1656 Issue date: 2018-05-21 CVE Names: CVE-2018-3639 =====================================================================
- Summary:
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 6.4) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64
- Description:
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
- An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1566890 - CVE-2018-3639 hw: cpu: speculative store bypass
- Package List:
Red Hat Enterprise Linux Server AUS (v. 6.4):
Source: qemu-kvm-0.12.1.2-2.355.el6_4.11.src.rpm
x86_64: qemu-guest-agent-0.12.1.2-2.355.el6_4.11.x86_64.rpm qemu-img-0.12.1.2-2.355.el6_4.11.x86_64.rpm qemu-kvm-0.12.1.2-2.355.el6_4.11.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.11.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.355.el6_4.11.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.4):
x86_64: qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.11.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBWwQw/NzjgjWX9erEAQibHhAAnQB3w7HZPsbJL4CZmQ6RiV2jFetYREs4 3uKesj4cIVIg5J1LtGU7sr8HW6dObPGoaqUcTtufUJRGYeQ0K70HJBdnQp7uzG7E 8xR4IjPcYYlPXQKTkFSVRhSi70UMljLMrNKkSK0bx5SSTr6n9EDbgJ2NqqIUa/Se ltBHixPaMZsGF039djGCmTaeqzApL54KxbRS7ypC5FI2nM6CmGNpSTzL7g30lgVu ryb4IrmG6OeujXA6WYMRjR7/ELfZ/APQFBnZwY4SnBlO544mu6WT7dh2fqnOqZy4 7vfXvhw/S7BqhBW+YTh9dp+KKXaeU/GhIrdTtJ7G5eF2QC0wZp1NxHhq7CMN/ROE sj12U4EEZwn0/J+/DZu8eoXsDu8vA1u4JYr0fhDKlnGL1grkfHyzS83isTrelPkr Rug5Efss9YNrUlPJIjcvPRmGOBEwHev73PYGRbEq/T0BeLKK9w3aXJX35hfoSaCU yNCkR06oH4q8mvK1kIvwOdkZOiPhezYDz91PsCZ9W7TO0meOyb1OVSL3z5KfsnhT 95g3HETNqfAkzO4kh/CG63mlkdWpwU1r4+SnzV88iZcqZIR8d47Iy/2SwZhISIzu 0b3T1Jh1Tp3TlhX86gJa0GpzlpAz3Hs0vuULuSnQz02K7B6V56R/rRe+1IsqZR3H QDFk7cwzswg= =J81W -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 10.14
macOS Mojave 10.14 addresses the following:
Bluetooth Available for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012) , iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac (Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015), Mac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012) , Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro (Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air (13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air (13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air (13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air (13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro (15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013), MacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina, 13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013) Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2018-5383: Lior Neumann and Eli Biham
The updates below are available for these Mac models: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013, Mid 2010, and Mid 2012 models with recommended Metal-capable graphics processor, including MSI Gaming Radeon RX 560 and Sapphire Radeon PULSE RX 580)
afpserver Impact: A remote attacker may be able to attack AFP servers through HTTP clients Description: An input validation issue was addressed with improved input validation. CVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC Berkeley Entry added October 30, 2018
App Store Impact: A malicious application may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc.
AppleGraphicsControl Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4417: Lee of the Information Security Lab Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Application Firewall Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A configuration issue was addressed with additional restrictions. CVE-2018-4353: Abhinav Bansal of LinkedIn Inc.
APR Impact: Multiple buffer overflow issues existed in Perl Description: Multiple issues in Perl were addressed with improved memory handling. CVE-2017-12613: Craig Young of Tripwire VERT CVE-2017-12618: Craig Young of Tripwire VERT Entry added October 30, 2018
ATS Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
ATS Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4308: Mohamed Ghannam (@_simo36) Entry added October 30, 2018
Auto Unlock Impact: A malicious application may be able to access local users AppleIDs Description: A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. CVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc.
CFNetwork Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
CoreFoundation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreFoundation Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018
CoreText Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018
Crash Reporter Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4333: Brandon Azad
CUPS Impact: In certain configurations, a remote attacker may be able to replace the message content from the print server with arbitrary content Description: An injection issue was addressed with improved validation. CVE-2018-4153: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
CUPS Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4406: Michael Hanselmann of hansmi.ch Entry added October 30, 2018
Dictionary Impact: Parsing a maliciously crafted dictionary file may lead to disclosure of user information Description: A validation issue existed which allowed local file access. This was addressed with input sanitization. CVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing Entry added October 30, 2018
Grand Central Dispatch Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4426: Brandon Azad Entry added October 30, 2018
Heimdal Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas F. Wenisch of University of Michigan, Mark Silberstein and Marina Minkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens of KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu of Intel Corporation, Yuval Yarom of The University of Adelaide Entry added October 30, 2018
iBooks Impact: Parsing a maliciously crafted iBooks file may lead to disclosure of user information Description: A configuration issue was addressed with additional restrictions. CVE-2018-4355: evi1m0 of bilibili security team Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4396: Yu Wang of Didi Research America CVE-2018-4418: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4351: Appology Team @ Theori working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4350: Yu Wang of Didi Research America Entry added October 30, 2018
Intel Graphics Driver Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4334: Ian Beer of Google Project Zero Entry added October 30, 2018
IOHIDFamily Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation CVE-2018-4408: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: A malicious application may be able to break out of its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4341: Ian Beer of Google Project Zero CVE-2018-4354: Ian Beer of Google Project Zero Entry added October 30, 2018
IOKit Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2018-4383: Apple Entry added October 30, 2018
IOUserEthernet Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4401: Apple Entry added October 30, 2018
Kernel Impact: A malicious application may be able to leak sensitive user information Description: An access issue existed with privileged API calls. This issue was addressed with additional restrictions. CVE-2018-4399: Fabiano Anemone (@anoane) Entry added October 30, 2018
Kernel Impact: An attacker in a privileged network position may be able to execute arbitrary code Description: A memory corruption issue was addressed with improved validation. CVE-2018-4407: Kevin Backhouse of Semmle Ltd. Entry added October 30, 2018
Kernel Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4336: Brandon Azad CVE-2018-4337: Ian Beer of Google Project Zero CVE-2018-4340: Mohamed Ghannam (@_simo36) CVE-2018-4344: The UK's National Cyber Security Centre (NCSC) CVE-2018-4425: cc working with Trend Micro's Zero Day Initiative, Juwei Lin (@panicaII) of Trend Micro working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
LibreSSL Impact: Multiple issues in libressl were addressed in this update Description: Multiple issues were addressed by updating to libressl version 2.6.4. CVE-2015-3194 CVE-2015-5333 CVE-2015-5334 CVE-2016-702 Entry added October 30, 2018
Login Window Impact: A local user may be able to cause a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of MWR InfoSecurity Entry added October 30, 2018
mDNSOffloadUserClient Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4326: an anonymous researcher working with Trend Micro's Zero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team Entry added October 30, 2018
MediaRemote Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. This ensures that older data read from recently-written-to addresses cannot be read via a speculative side-channel. CVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken Johnson of the Microsoft Security Response Center (MSRC) Entry added October 30, 2018
Security Impact: A local user may be able to cause a denial of service Description: This issue was addressed with improved checks. CVE-2018-4395: Patrick Wardle of Digita Security Entry added October 30, 2018
Security Impact: An attacker may be able to exploit weaknesses in the RC4 cryptographic algorithm Description: This issue was addressed by removing RC4. CVE-2016-1777: Pepi Zawodsky
Spotlight Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4393: Lufeng Li Entry added October 30, 2018
Symptom Framework Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Text Impact: Processing a maliciously crafted text file may lead to a denial of service Description: A denial of service issue was addressed with improved validation. CVE-2018-4304: jianan.huang (@Sevck) Entry added October 30, 2018
Wi-Fi Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend Micro's Zero Day Initiative Entry added October 30, 2018
Additional recognition
Accessibility Framework We would like to acknowledge Ryan Govostes for their assistance.
Core Data We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
CoreDAV We would like to acknowledge an anonymous researcher for their assistance.
CoreGraphics We would like to acknowledge Nitin Arya of Roblox Corporation for their assistance.
CoreSymbolication We would like to acknowledge Brandon Azad for their assistance.
IOUSBHostFamily We would like to acknowledge an anonymous researcher for their assistance.
Kernel We would like to acknowledge Brandon Azad for their assistance.
Mail We would like to acknowledge Alessandro Avagliano of Rocket Internet SE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron Software Systems, and Zbyszek A>>A3Akiewski for their assistance.
Quick Look We would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing and Patrick Wardle of Digita Security and lokihardt of Google Project Zero for their assistance.
Security We would like to acknowledge Christoph Sinai, Daniel Dudek (@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak) of ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of Shapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson Ding, and an anonymous researcher for their assistance.
SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance.
Terminal We would like to acknowledge an anonymous researcher for their assistance.
WindowServer We would like to acknowledge Patrick Wardle of Digita Security for their assistance.
Installation note:
macOS Mojave 10.14 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgYpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GrtxAA iVBcAdusz88zFzkT05EIxb9nSp4CGOlhKlChK4N7Db17o2fNT0hNpQixEAC0wC/A zqIzsXEzZlPobI4OnwiEVs7lVBsvCW+IarrRZ8pgSllKs1VlbNfOO3z9vB5BqJMr d9PjPvtHyG3jZmWqQPIjvJb3l3ZjHAt+HAvTItNMkhIUjqV80JI8wP3erzIf3tAt VoLIw5iL5w4HAYcWsn9DYcecXZdv39MnKL5UGzMX3bkee2U7kGYtgskU+mdPa1Wl WzquIPlLeKL2KNSXEfbkPtcKM/fvkURsNzEDvg+PBQLdI3JeR1bOeN24aiTEtiEL TecGm/kKMMJWmDdhPhFvZVD+SIdZd4LgbTawR1UE1JJg7jnEZKCvZ45mXd2eBwn/ rpEKCLBsgA59GILs3ZjZSIWskRJPzZrt463AKcN2wukkTUUkY1rhRVdOf6LZMs9Z w9iJOua3vt+HzCCxTEaH53WUeM6fn/Yeq+DGIS5Fk0G09pU7tsyJVwj3o1nJn0dl e2mcrXBJeSmi6bvvkJX45y/Y8E8Qr+ovS4uN8wG6DOWcCBQkDkugabng8vNh8GST 1wNnV9JY/CmYbU0ZIwKbbSDkcQLQuIl7kKaZMHnU74EytcKscUqqx1VqINz1tssu 1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k= =i9YR -----END PGP SIGNATURE----- . Description:
The VDSM service is required by a Virtualization Manager to manage the Linux hosts. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection. Description:
The org.ovirt.engine-root is a core component of oVirt. 5 ELS) - i386, noarch, s390x, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. Description:
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Software Description: - intel-microcode: Processor microcode for Intel CPUs
Details:
It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). This vulnerability is also known as Rogue System Register Read (RSRE). ========================================================================== Ubuntu Security Notice USN-3655-1 May 22, 2018
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were addressed in the Linux kernel. (CVE-2018-3639)
Jan H. Schonherr discovered that the Xen subsystem did not properly handle block IO merges correctly in some situations. An attacker in a guest vm could use this to cause a denial of service (host crash) or possibly gain administrative privileges in the host. (CVE-2017-12134)
It was discovered that the Bluetooth HIP Protocol implementation in the Linux kernel did not properly validate HID connection setup information. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-13220)
It was discovered that a buffer overread vulnerability existed in the keyring subsystem of the Linux kernel. (CVE-2017-13305)
It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. (CVE-2017-17449)
It was discovered that a race condition existed in the i8042 serial device driver implementation in the Linux kernel. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18079)
It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203)
It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204)
It was discovered that an infinite loop could occur in the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208)
Kefeng Wang discovered that a race condition existed in the memory locking implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2017-18221)
Silvio Cesare discovered a buffer overwrite existed in the NCPFS implementation in the Linux kernel. A remote attacker controlling a malicious NCPFS server could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-8822)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-3.13.0-149-generic 3.13.0-149.199 linux-image-3.13.0-149-generic-lpae 3.13.0-149.199 linux-image-3.13.0-149-lowlatency 3.13.0-149.199 linux-image-3.13.0-149-powerpc-e500 3.13.0-149.199 linux-image-3.13.0-149-powerpc-e500mc 3.13.0-149.199 linux-image-3.13.0-149-powerpc-smp 3.13.0-149.199 linux-image-3.13.0-149-powerpc64-emb 3.13.0-149.199 linux-image-3.13.0-149-powerpc64-smp 3.13.0-149.199 linux-image-generic 3.13.0.149.159 linux-image-generic-lpae 3.13.0.149.159 linux-image-lowlatency 3.13.0.149.159 linux-image-powerpc-e500 3.13.0.149.159 linux-image-powerpc-e500mc 3.13.0.149.159 linux-image-powerpc-smp 3.13.0.149.159 linux-image-powerpc64-emb 3.13.0.149.159 linux-image-powerpc64-smp 3.13.0.149.159
Please note that fully mitigating CVE-2018-3639 (Spectre Variant 4) may require corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the SSBD feature is required to enable the kernel mitigations. BIOS vendors will be making updates available for Intel processors that implement SSBD and Ubuntu is working with Intel to provide future microcode updates. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu provided corresponding QEMU updates for users of self-hosted virtual environments in USN 3651-1. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines.
References: https://usn.ubuntu.com/usn/usn-3655-1 CVE-2017-12134, CVE-2017-13220, CVE-2017-13305, CVE-2017-17449, CVE-2017-18079, CVE-2017-18203, CVE-2017-18204, CVE-2017-18208, CVE-2017-18221, CVE-2018-3639, CVE-2018-8822, https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Variant4
Package Information: https://launchpad.net/ubuntu/+source/linux/3.13.0-149.199
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0963",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "xeon e5 2650l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v4"
},
{
"model": "xeon e3 1240l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v4"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4660_v3"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "xeon e5 2430l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1240 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860_v3"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3736g"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v3"
},
{
"model": "xeon e3 1225 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4860_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "45nm"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3775"
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1809"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86130t"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3850"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86126t"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1545m_v5"
},
{
"model": "xeon e5 2637",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4807"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "15"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3480"
},
{
"model": "simatic ipc827d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "19.02.11"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3745"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3580"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3480"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5504"
},
{
"model": "xeon e3 1278l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830"
},
{
"model": "simatic ipc427e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "21.01.09"
},
{
"model": "windows 7",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880l_v2"
},
{
"model": "jetson tx2",
"scope": "lt",
"trust": 1.0,
"vendor": "nvidia",
"version": "r28.3"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160"
},
{
"model": "xeon e3 1265l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2430 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1280 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4109t"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4667_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v2"
},
{
"model": "xeon e5 2603 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "57"
},
{
"model": "xeon e5 2620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5507"
},
{
"model": "xeon e3 1281 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660"
},
{
"model": "xeon e5 2450l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v2"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "17.10"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735d"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867l"
},
{
"model": "xeon e5 2630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "windows server 2012",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8180"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2650l_v4"
},
{
"model": "xeon e3 1225 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v2"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "xeon e5 2648l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v3"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j3455"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w5580"
},
{
"model": "mivoice border gateway",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86134m"
},
{
"model": "surface",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "mivoic mx-one",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon e5 2438l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2480"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86144"
},
{
"model": "xeon e5 2470 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom x5-e3930",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic ipc547e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "r1.30.0"
},
{
"model": "windows server 2016",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1803"
},
{
"model": "xeon e5 2407 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2450 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2609 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "sp2"
},
{
"model": "xeon e5 2609 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v3"
},
{
"model": "simatic ipc647c",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.01.14"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3808"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5508_"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1515m_v5"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86126"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86132"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640"
},
{
"model": "xeon e3 1245",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2418l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2643 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86142m"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v2"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1535m_v5"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v2"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85120"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "3600"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86134"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85120t"
},
{
"model": "pentium silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n5000"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3785"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5550"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4114"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3827"
},
{
"model": "simatic ipc827c",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.02.15"
},
{
"model": "xeon e5 1428l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670_v3"
},
{
"model": "xeon e5 2430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4890_v2"
},
{
"model": "xeon e5 2428l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2640 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667"
},
{
"model": "xeon e5 2618l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2643 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4603_v2"
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4105"
},
{
"model": "simatic ipc427d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "17.0x.14"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4880_v2"
},
{
"model": "itc1500 pro",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176f"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1565l_v5"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4648_v3"
},
{
"model": "xeon e5 1660 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ruggedcom ape",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8857_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8837"
},
{
"model": "xeon e5 2620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1505l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4628l_v4"
},
{
"model": "xeon e5 2618l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85115"
},
{
"model": "solaris",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "11"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4603"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2665"
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "32nm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v2"
},
{
"model": "xeon e5 2630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v4"
},
{
"model": "xeon e3 1265l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1650",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3538"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v2"
},
{
"model": "pentium silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j5005"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3570"
},
{
"model": "xeon e5 1680 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3560"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2850"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "sonicosv",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v2"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5520"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160f"
},
{
"model": "email security",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v4"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4624l_v2"
},
{
"model": "xeon e5 1650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1268l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650_v4"
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "9"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2520"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85119t"
},
{
"model": "xeon e5 2608l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "itc2200",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2803"
},
{
"model": "xeon e5 2643 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4607_v2"
},
{
"model": "xeon e5 1620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3308"
},
{
"model": "secure mobile access",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e5 2637 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2630l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3770"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4607"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3955"
},
{
"model": "xeon e3 1270 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3530"
},
{
"model": "xeon e5 2630l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2460"
},
{
"model": "xeon e3 1220 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1230 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86146"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5506"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8158"
},
{
"model": "simatic ipc677d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "19.02.11"
},
{
"model": "cloud global management system",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v2"
},
{
"model": "core i7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "32nm"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1585l_v5"
},
{
"model": "xeon e5 2408l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4116t"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3758"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "xeon e5 1650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "surface pro with lte advanced",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1807"
},
{
"model": "windows server 2016",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "simatic ipc477e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "21.01.09"
},
{
"model": "xeon e3 1275 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v2"
},
{
"model": "xeon e3 1240 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4655_v4"
},
{
"model": "simatic ipc847c",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.01.14"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5560"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v2"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3845"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c2308"
},
{
"model": "xeon e3 1280 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "18.04"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650"
},
{
"model": "xeon e5 2637 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2820"
},
{
"model": "mivoice business",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4870_v2"
},
{
"model": "xeon e5 2630l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8168"
},
{
"model": "xeon e3 1241 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86142"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160m"
},
{
"model": "xeon e3 1230l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1260l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "virtualization manager",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.3"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4655_v3"
},
{
"model": "xeon e3 1225",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1709"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v3"
},
{
"model": "xeon e3 1271 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1260l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "itc2200 pro",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "xeon e3 1245 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5506"
},
{
"model": "xeon e5 1650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2760"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l3406"
},
{
"model": "xeon e3 1245 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1275 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1230",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "jetson tx1",
"scope": "lt",
"trust": 1.0,
"vendor": "nvidia",
"version": "r28.3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l3403"
},
{
"model": "xeon e5 2623 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v2"
},
{
"model": "xeon e3 1240 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658"
},
{
"model": "xeon e3 1285 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3440"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w_v3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3460"
},
{
"model": "xeon e5 2628l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2698_v3"
},
{
"model": "xeon e5 2630 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86128"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86148f"
},
{
"model": "local service management system",
"scope": "gte",
"trust": 1.0,
"vendor": "oracle",
"version": "13.0"
},
{
"model": "pentium",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4000"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "45nm"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3590"
},
{
"model": "xeon e5 1428l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "micloud management portal",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": "*"
},
{
"model": "surface pro",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1796"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v3"
},
{
"model": "xeon e5 2448l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2428l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3745d"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "struxureware data center expert",
"scope": "lt",
"trust": 1.0,
"vendor": "schneider electric",
"version": "7.6.0"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2560"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2860"
},
{
"model": "xeon e5 2637 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v3"
},
{
"model": "xeon e3 1285l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3958"
},
{
"model": "simatic ipc547g",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "r1.23.0"
},
{
"model": "xeon e5 2418l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3805"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3825"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3770d"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3508"
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1607"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2850_v2"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8153"
},
{
"model": "xeon e5 2603 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "micollab",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8170"
},
{
"model": "xeon e3 1286l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1660 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4100"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5115"
},
{
"model": "xeon e3 12201 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1280",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2640 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2643",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "windows server 2008",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "r2"
},
{
"model": "virtualization",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8893_v4"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5503"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4830_v2"
},
{
"model": "xeon e3 1285 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4005"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3826"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v4"
},
{
"model": "xeon e3 1225 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1703"
},
{
"model": "xeon e3 1240l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3460"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v2"
},
{
"model": "atom x7-e3950",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2430l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2667_v3"
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "12"
},
{
"model": "xeon e5 2448l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2407",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v3"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v2"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3430"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867_v3"
},
{
"model": "xeon e3 1270 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1268l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86138f"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v3"
},
{
"model": "xeon e3 1501m v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2618l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2670_v2"
},
{
"model": "xeon e3 1220 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3470"
},
{
"model": "xeon e5 2603 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic ipc477e pro",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "21.01.09"
},
{
"model": "xeon e3 1245 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2450l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4860"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8160t"
},
{
"model": "xeon e3 1225 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4112"
},
{
"model": "xeon e3 1276 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1558l_v5"
},
{
"model": "xeon e3 1505m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4108"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"model": "web application firewall",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e5 2650l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699r_v4"
},
{
"model": "atom e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e3815"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2698_v4"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5518_"
},
{
"model": "xeon e5 1620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "w5590"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610"
},
{
"model": "xeon e3 1220l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1230 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v3"
},
{
"model": "xeon e3 1235l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1578l_v5"
},
{
"model": "xeon e3 1226 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1535m_v6"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3338"
},
{
"model": "xeon e5 1428l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3740d"
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "45nm"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2687w"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v4"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "125c_"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86142f"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86154"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870_v4"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8164"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658a_v3"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690"
},
{
"model": "xeon e5 2648l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2603",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1275 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v3"
},
{
"model": "sinema remote connect",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86140"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "xeon e5 2628l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4116"
},
{
"model": "xeon e3 1285 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4669_v4"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86138"
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "8"
},
{
"model": "xeon e3 12201",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2660_v4"
},
{
"model": "xeon e5 2418l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic field pg m5",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "22.01.06"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v3"
},
{
"model": "simatic ipc677c",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.02.15"
},
{
"model": "surface pro",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "3"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3750"
},
{
"model": "xeon e5 1630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "45nm"
},
{
"model": "xeon e5 2450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86136"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699a_v4"
},
{
"model": "xeon e5 2403",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "13"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e6550"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "windows server 2016",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1709"
},
{
"model": "xeon e3 1270 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1585_v5"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735g"
},
{
"model": "xeon e5 2403 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1501l v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2440",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v2"
},
{
"model": "pentium j",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "j4205"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2580"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735e"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8830"
},
{
"model": "surface book",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1220_"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3558"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v4"
},
{
"model": "surface studio",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3950"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697a_v4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2870_v2"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4870"
},
{
"model": "simatic ipc847d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "19.01.14"
},
{
"model": "xeon e3 1245 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "7500"
},
{
"model": "xeon e5 1630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3736f"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4667_v4"
},
{
"model": "itc1900 pro",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "xeon e5 2470",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "10"
},
{
"model": "surface pro",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "4"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v3"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4640_v4"
},
{
"model": "xeon e5 2648l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "sinumerik pcu 50.5",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.02.15"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2683_v3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5530"
},
{
"model": "xeon e3 1220 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-1105c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "sinumerik 840 d sl",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "xeon e3 1258l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4620_v4"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4669_v3"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3740"
},
{
"model": "simatic itp1000",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "23.01.04"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3858"
},
{
"model": "xeon e3 1235",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4650l"
},
{
"model": "xeon e3 1270 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simotion p320-4e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "17.0x.14"
},
{
"model": "xeon e5 2640 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1575m_v5"
},
{
"model": "xeon e3 1220 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8890_v4"
},
{
"model": "xeon e5 2609 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x3450"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8860"
},
{
"model": "simatic ipc477c",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l3426"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86152"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9"
},
{
"model": "xeon e5 1620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2630l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1275_"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5540"
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4110"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2890_v2"
},
{
"model": "xeon e5 1660 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2699_v4"
},
{
"model": "open integration gateway",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon e3 1240 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic ipc477d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "17.0x.14"
},
{
"model": "simatic et 200 sp",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2.6"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8891_v3"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "xeon e5 2420 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86130"
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "1803"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8850_v2"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176m"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86140m"
},
{
"model": "xeon e3 1265l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3775d"
},
{
"model": "xeon e3 1246 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "virtualization manager",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.2"
},
{
"model": "local service management system",
"scope": "lte",
"trust": 1.0,
"vendor": "oracle",
"version": "13.3"
},
{
"model": "xeon e3 1275l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86148"
},
{
"model": "xeon e5 2623 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4809_v4"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4657l_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2690_v4"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z2420"
},
{
"model": "openstack",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880l_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8850"
},
{
"model": "xeon e3 1275 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom x5-e3940",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1285l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8867_v4"
},
{
"model": "xeon e3 1280 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86138t"
},
{
"model": "simatic ipc427c",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "core i3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "32nm"
},
{
"model": "simatic ipc347e",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.5"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e6510"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3830"
},
{
"model": "xeon e5 1660",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2428l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "sinumerik tcu 30.3",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "mivoice connect",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "windows 8.1",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "xeon e5 2630",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic ipc627d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "19.02.11"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8880_v3"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v4"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "16.04"
},
{
"model": "windows server 2012",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "r2"
},
{
"model": "xeon e3 1230 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "simatic s7-1500",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "2.6"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2695_v4"
},
{
"model": "xeon e5 2440 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4850_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680_v4"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "mivoice 5000",
"scope": "eq",
"trust": 1.0,
"vendor": "mitel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "1505m_v6"
},
{
"model": "itc1500",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "xeon e5 2648l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85122"
},
{
"model": "atom c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "c3708"
},
{
"model": "xeon e3 1290 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 1680 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1125c v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8170m"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4820_v4"
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8156"
},
{
"model": "xeon e3 1231 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8176"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2830"
},
{
"model": "xeon e3 1505l v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2628l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8870"
},
{
"model": "cortex-a",
"scope": "eq",
"trust": 1.0,
"vendor": "arm",
"version": "72"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "8894_v4"
},
{
"model": "xeon e3 1230 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2609",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2870"
},
{
"model": "simatic ipc3000 smart",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "1.5"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2680"
},
{
"model": "xeon e5 2640",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5502"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4617"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e6540"
},
{
"model": "simatic ipc647d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "19.01.14"
},
{
"model": "xeon e3 1280 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1270",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n4200"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "e5530"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4610_v3"
},
{
"model": "xeon e3 1105c v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4114t"
},
{
"model": "simatic field pg m4",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "18.01.09"
},
{
"model": "itc1900",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "3.1"
},
{
"model": "simatic ipc627c",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "15.02.15"
},
{
"model": "core m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "32nm"
},
{
"model": "global management system",
"scope": "eq",
"trust": 1.0,
"vendor": "sonicwall",
"version": null
},
{
"model": "xeon e3 1286 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3 1290",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "n3450"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2658_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4660_v4"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "x5570"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86150"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "l5520"
},
{
"model": "mrg realtime",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "2.0"
},
{
"model": "xeon e7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2880_v2"
},
{
"model": "windows 10",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": null
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2697_v2"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "4627_v3"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "xeon e3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "5600"
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3795"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.7"
},
{
"model": "xeon e5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "2683_v4"
},
{
"model": "xeon e3 1240",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5 2620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "surface book",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "2"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86130f"
},
{
"model": "xeon e5 2608l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "atom z",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "z3735f"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "86126f"
},
{
"model": "xeon gold",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "85118"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "amd",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "arm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dell",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dell emc",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fortinet",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hp",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hitachi",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "microsoft",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "qualcomm incorporated",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "suse linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "synology",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "vmware",
"version": null
},
{
"model": "cortex a57",
"scope": null,
"trust": 0.6,
"vendor": "arm",
"version": null
},
{
"model": "5th generation core processors",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cortex a72",
"scope": null,
"trust": 0.6,
"vendor": "arm",
"version": null
},
{
"model": "6th generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "5th generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "4th generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "3rd generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "2nd generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "8th generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "7th generation core processors",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "atom processor a series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "atom processor c series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "atom processor e series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "atom processor t series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "atom processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "x0"
},
{
"model": "atom processor z series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "core x-series processor family for intel platforms",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "x990"
},
{
"model": "celeron processor j series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "celeron processor n series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "core m processor family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "core x-series processor family for intel platforms",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "x2990"
},
{
"model": "pentium processor n series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "pentium processor silver series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "34000"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "36000"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "55000"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "56000"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "75000"
},
{
"model": "xeon processor series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "65000"
},
{
"model": "pentium processor j series",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v20"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v3"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v40"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v50"
},
{
"model": "xeon processor e3 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v60"
},
{
"model": "xeon processor e5 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "xeon processor e5 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v20"
},
{
"model": "xeon processor e5 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v3"
},
{
"model": "xeon processor e5 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v40"
},
{
"model": "xeon processor e7 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "0"
},
{
"model": "xeon processor e7 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v20"
},
{
"model": "xeon processor e7 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v3"
},
{
"model": "xeon processor e7 family",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "v40"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "147742"
},
{
"db": "PACKETSTORM",
"id": "148506"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
}
],
"trust": 0.8
},
"cve": "CVE-2018-3639",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-3639",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-13391",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-133670",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-3639",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-3639",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-13391",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-133670",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. \n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 3.20180703.2~deb9u1. \n\nWe recommend that you upgrade your intel-microcode packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: qemu-kvm security update\nAdvisory ID: RHSA-2018:1656-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:1656\nIssue date: 2018-05-21\nCVE Names: CVE-2018-3639 \n=====================================================================\n\n1. Summary:\n\nAn update for qemu-kvm is now available for Red Hat Enterprise Linux 6.4\nAdvanced Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64\n\n3. Description:\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm packages provide the\nuser-space component for running virtual machines that use KVM. \n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, shut down all running virtual machines. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 6.4):\n\nSource:\nqemu-kvm-0.12.1.2-2.355.el6_4.11.src.rpm\n\nx86_64:\nqemu-guest-agent-0.12.1.2-2.355.el6_4.11.x86_64.rpm\nqemu-img-0.12.1.2-2.355.el6_4.11.x86_64.rpm\nqemu-kvm-0.12.1.2-2.355.el6_4.11.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.11.x86_64.rpm\nqemu-kvm-tools-0.12.1.2-2.355.el6_4.11.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.4):\n\nx86_64:\nqemu-guest-agent-win32-0.12.1.2-2.355.el6_4.11.x86_64.rpm\nqemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.11.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBWwQw/NzjgjWX9erEAQibHhAAnQB3w7HZPsbJL4CZmQ6RiV2jFetYREs4\n3uKesj4cIVIg5J1LtGU7sr8HW6dObPGoaqUcTtufUJRGYeQ0K70HJBdnQp7uzG7E\n8xR4IjPcYYlPXQKTkFSVRhSi70UMljLMrNKkSK0bx5SSTr6n9EDbgJ2NqqIUa/Se\nltBHixPaMZsGF039djGCmTaeqzApL54KxbRS7ypC5FI2nM6CmGNpSTzL7g30lgVu\nryb4IrmG6OeujXA6WYMRjR7/ELfZ/APQFBnZwY4SnBlO544mu6WT7dh2fqnOqZy4\n7vfXvhw/S7BqhBW+YTh9dp+KKXaeU/GhIrdTtJ7G5eF2QC0wZp1NxHhq7CMN/ROE\nsj12U4EEZwn0/J+/DZu8eoXsDu8vA1u4JYr0fhDKlnGL1grkfHyzS83isTrelPkr\nRug5Efss9YNrUlPJIjcvPRmGOBEwHev73PYGRbEq/T0BeLKK9w3aXJX35hfoSaCU\nyNCkR06oH4q8mvK1kIvwOdkZOiPhezYDz91PsCZ9W7TO0meOyb1OVSL3z5KfsnhT\n95g3HETNqfAkzO4kh/CG63mlkdWpwU1r4+SnzV88iZcqZIR8d47Iy/2SwZhISIzu\n0b3T1Jh1Tp3TlhX86gJa0GpzlpAz3Hs0vuULuSnQz02K7B6V56R/rRe+1IsqZR3H\nQDFk7cwzswg=\n=J81W\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2018-10-30-9 Additional information for\nAPPLE-SA-2018-9-24-1 macOS Mojave 10.14\n\nmacOS Mojave 10.14 addresses the following:\n\nBluetooth\nAvailable for: iMac (21.5-inch, Late 2012), iMac (27-inch, Late 2012)\n, iMac (21.5-inch, Late 2013), iMac (21.5-inch, Mid 2014), iMac\n(Retina 5K, 27-inch, Late 2014), iMac (21.5-inch, Late 2015),\nMac mini (Mid 2011), Mac mini Server (Mid 2011), Mac mini (Late 2012)\n, Mac mini Server (Late 2012), Mac mini (Late 2014), Mac Pro\n(Late 2013), MacBook Air (11-inch, Mid 2011), MacBook Air\n(13-inch, Mid 2011), MacBook Air (11-inch, Mid 2012), MacBook Air\n(13-inch, Mid 2012), MacBook Air (11-inch, Mid 2013), MacBook Air\n(13-inch, Mid 2013), MacBook Air (11-inch, Early 2015), MacBook Air\n(13-inch, Early 2015), MacBook Pro (13-inch, Mid 2012), MacBook Pro\n(15-inch, Mid 2012), MacBook Pro (Retina, 13-inch, Early 2013),\nMacBook Pro (Retina, 15-inch, Early 2013), MacBook Pro (Retina,\n13-inch, Late 2013), and MacBook Pro (Retina, 15-inch, Late 2013)\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2018-5383: Lior Neumann and Eli Biham\n\nThe updates below are available for these Mac models:\nMacBook (Early 2015 and later), MacBook Air (Mid 2012 and later),\nMacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later),\niMac (Late 2012 and later), iMac Pro (all models), Mac Pro\n(Late 2013, Mid 2010, and Mid 2012 models with recommended\nMetal-capable graphics processor, including MSI Gaming Radeon RX 560\nand Sapphire Radeon PULSE RX 580)\n\nafpserver\nImpact: A remote attacker may be able to attack AFP servers through\nHTTP clients\nDescription: An input validation issue was addressed with improved\ninput validation. \nCVE-2018-4295: Jianjun Chen (@whucjj) from Tsinghua University and UC\nBerkeley\nEntry added October 30, 2018\n\nApp Store\nImpact: A malicious application may be able to determine the Apple ID\nof the owner of the computer\nDescription: A permissions issue existed in the handling of the Apple\nID. This issue was addressed with improved access controls. \nCVE-2018-4324: Sergii Kryvoblotskyi of MacPaw Inc. \n\nAppleGraphicsControl\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4417: Lee of the Information Security Lab Yonsei University\nworking with Trend Micro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nApplication Firewall\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4353: Abhinav Bansal of LinkedIn Inc. \n\nAPR\nImpact: Multiple buffer overflow issues existed in Perl\nDescription: Multiple issues in Perl were addressed with improved\nmemory handling. \nCVE-2017-12613: Craig Young of Tripwire VERT\nCVE-2017-12618: Craig Young of Tripwire VERT\nEntry added October 30, 2018\n\nATS\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4411: lilang wu moony Li of Trend Micro working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nATS\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4308: Mohamed Ghannam (@_simo36)\nEntry added October 30, 2018\n\nAuto Unlock\nImpact: A malicious application may be able to access local users\nAppleIDs\nDescription: A validation issue existed in the entitlement\nverification. This issue was addressed with improved validation of\nthe process entitlement. \nCVE-2018-4321: Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. \n\nCFNetwork\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4412: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreFoundation\nImpact: An application may be able to gain elevated privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4414: The UK\u0027s National Cyber Security Centre (NCSC)\nEntry added October 30, 2018\n\nCoreText\nImpact: Processing a maliciously crafted text file may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2018-4347: an anonymous researcher\nEntry added October 30, 2018\n\nCrash Reporter\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4333: Brandon Azad\n\nCUPS\nImpact: In certain configurations, a remote attacker may be able to\nreplace the message content from the print server with arbitrary\ncontent\nDescription: An injection issue was addressed with improved\nvalidation. \nCVE-2018-4153: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nCUPS\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4406: Michael Hanselmann of hansmi.ch\nEntry added October 30, 2018\n\nDictionary\nImpact: Parsing a maliciously crafted dictionary file may lead to\ndisclosure of user information\nDescription: A validation issue existed which allowed local file\naccess. This was addressed with input sanitization. \nCVE-2018-4346: Wojciech ReguAa (@_r3ggi) of SecuRing\nEntry added October 30, 2018\n\nGrand Central Dispatch\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4426: Brandon Azad\nEntry added October 30, 2018\n\nHeimdal\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-3646: Baris Kasikci, Daniel Genkin, Ofir Weisse, and Thomas\nF. Wenisch of University of Michigan, Mark Silberstein and Marina\nMinkin of Technion, Raoul Strackx, Jo Van Bulck, and Frank Piessens\nof KU Leuven, Rodrigo Branco, Henrique Kawakami, Ke Sun, and Kekai Hu\nof Intel Corporation, Yuval Yarom of The University of Adelaide\nEntry added October 30, 2018\n\niBooks\nImpact: Parsing a maliciously crafted iBooks file may lead to\ndisclosure of user information\nDescription: A configuration issue was addressed with additional\nrestrictions. \nCVE-2018-4355: evi1m0 of bilibili security team\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4396: Yu Wang of Didi Research America\nCVE-2018-4418: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2018-4351: Appology Team @ Theori working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4350: Yu Wang of Didi Research America\nEntry added October 30, 2018\n\nIntel Graphics Driver\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4334: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOHIDFamily\nImpact: A malicious application may be able to execute arbitrary code\nwith kernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation\nCVE-2018-4408: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4341: Ian Beer of Google Project Zero\nCVE-2018-4354: Ian Beer of Google Project Zero\nEntry added October 30, 2018\n\nIOKit\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2018-4383: Apple\nEntry added October 30, 2018\n\nIOUserEthernet\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4401: Apple\nEntry added October 30, 2018\n\nKernel\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: An access issue existed with privileged API calls. This\nissue was addressed with additional restrictions. \nCVE-2018-4399: Fabiano Anemone (@anoane)\nEntry added October 30, 2018\n\nKernel\nImpact: An attacker in a privileged network position may be able to\nexecute arbitrary code\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2018-4407: Kevin Backhouse of Semmle Ltd. \nEntry added October 30, 2018\n\nKernel\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4336: Brandon Azad\nCVE-2018-4337: Ian Beer of Google Project Zero\nCVE-2018-4340: Mohamed Ghannam (@_simo36)\nCVE-2018-4344: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2018-4425: cc working with Trend Micro\u0027s Zero Day Initiative,\nJuwei Lin (@panicaII) of Trend Micro working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nLibreSSL\nImpact: Multiple issues in libressl were addressed in this update\nDescription: Multiple issues were addressed by updating to libressl\nversion 2.6.4. \nCVE-2015-3194\nCVE-2015-5333\nCVE-2015-5334\nCVE-2016-702\nEntry added October 30, 2018\n\nLogin Window\nImpact: A local user may be able to cause a denial of service\nDescription: A validation issue was addressed with improved logic. \nCVE-2018-4348: Ken Gannon of MWR InfoSecurity and Christian Demko of\nMWR InfoSecurity\nEntry added October 30, 2018\n\nmDNSOffloadUserClient\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4326: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative, Zhuo Liang of Qihoo 360 Nirvan Team\nEntry added October 30, 2018\n\nMediaRemote\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: An access issue was addressed with additional sandbox\nrestrictions. This ensures that older data read from\nrecently-written-to addresses cannot be read via a speculative\nside-channel. \nCVE-2018-3639: Jann Horn (@tehjh) of Google Project Zero (GPZ), Ken\nJohnson of the Microsoft Security Response Center (MSRC)\nEntry added October 30, 2018\n\nSecurity\nImpact: A local user may be able to cause a denial of service\nDescription: This issue was addressed with improved checks. \nCVE-2018-4395: Patrick Wardle of Digita Security\nEntry added October 30, 2018\n\nSecurity\nImpact: An attacker may be able to exploit weaknesses in the RC4\ncryptographic algorithm\nDescription: This issue was addressed by removing RC4. \nCVE-2016-1777: Pepi Zawodsky\n\nSpotlight\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4393: Lufeng Li\nEntry added October 30, 2018\n\nSymptom Framework\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4203: Bruno Keith (@bkth_) working with Trend Micro\u0027s Zero\nDay Initiative\nEntry added October 30, 2018\n\nText\nImpact: Processing a maliciously crafted text file may lead to a\ndenial of service\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4304: jianan.huang (@Sevck)\nEntry added October 30, 2018\n\nWi-Fi\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2018-4338: Lee @ SECLAB, Yonsei University working with Trend\nMicro\u0027s Zero Day Initiative\nEntry added October 30, 2018\n\nAdditional recognition\n\nAccessibility Framework\nWe would like to acknowledge Ryan Govostes for their assistance. \n\nCore Data\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nCoreDAV\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nCoreGraphics\nWe would like to acknowledge Nitin Arya of Roblox Corporation for\ntheir assistance. \n\nCoreSymbolication\nWe would like to acknowledge Brandon Azad for their assistance. \n\nIOUSBHostFamily\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nKernel\nWe would like to acknowledge Brandon Azad for their assistance. \n\nMail\nWe would like to acknowledge Alessandro Avagliano of Rocket Internet\nSE, John Whitehead of The New York Times, Kelvin Delbarre of Omicron\nSoftware Systems, and Zbyszek A\u003e\u003eA3Akiewski for their assistance. \n\nQuick Look\nWe would like to acknowledge Wojciech ReguAa (@_r3ggi) of SecuRing\nand Patrick Wardle of Digita Security and lokihardt of Google Project\nZero for their assistance. \n\nSecurity\nWe would like to acknowledge Christoph Sinai, Daniel Dudek\n(@dannysapples) of The Irish Times and Filip KlubiAka (@lemoncloak)\nof ADAPT Centre, Dublin Institute of Technology, Istvan Csanady of\nShapr3D, Omar Barkawi of ITG Software, Inc., Phil Caleno, Wilson\nDing, and an anonymous researcher for their assistance. \n\nSQLite\nWe would like to acknowledge Andreas Kurtz (@aykay) of NESO Security\nLabs GmbH for their assistance. \n\nTerminal\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nWindowServer\nWe would like to acknowledge Patrick Wardle of Digita Security for\ntheir assistance. \n\nInstallation note:\n\nmacOS Mojave 10.14 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\n1wZZGLtg3VubrZOsnUZzumD+0nI8c6QAnQK3P2PSZ0k=\n=i9YR\n-----END PGP SIGNATURE-----\n. Description:\n\nThe VDSM service is required by a Virtualization Manager to manage the\nLinux hosts. VDSM manages and monitors the host\u0027s storage, memory and\nnetworks as well as virtual machine creation, other host administration\ntasks, statistics gathering, and log collection. Description:\n\nThe org.ovirt.engine-root is a core component of oVirt. 5 ELS) - i386, noarch, s390x, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. \n\nSoftware Description:\n- intel-microcode: Processor microcode for Intel CPUs\n\nDetails:\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. This vulnerability is also known as L1 Terminal Fault (L1TF). This vulnerability is also known as Rogue\nSystem Register Read (RSRE). ==========================================================================\nUbuntu Security Notice USN-3655-1\nMay 22, 2018\n\nlinux vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were addressed in the Linux kernel. (CVE-2018-3639)\n\nJan H. Schonherr discovered that the Xen subsystem did not properly handle\nblock IO merges correctly in some situations. An attacker in a guest vm\ncould use this to cause a denial of service (host crash) or possibly gain\nadministrative privileges in the host. (CVE-2017-12134)\n\nIt was discovered that the Bluetooth HIP Protocol implementation in the\nLinux kernel did not properly validate HID connection setup information. An\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-13220)\n\nIt was discovered that a buffer overread vulnerability existed in the\nkeyring subsystem of the Linux kernel. (CVE-2017-13305)\n\nIt was discovered that the netlink subsystem in the Linux kernel did not\nproperly restrict observations of netlink messages to the appropriate net\nnamespace. (CVE-2017-17449)\n\nIt was discovered that a race condition existed in the i8042 serial device\ndriver implementation in the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-18079)\n\nIt was discovered that a race condition existed in the Device Mapper\ncomponent of the Linux kernel. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2017-18203)\n\nIt was discovered that a race condition existed in the OCFS2 file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (kernel deadlock). (CVE-2017-18204)\n\nIt was discovered that an infinite loop could occur in the madvise(2)\nimplementation in the Linux kernel in certain circumstances. A local\nattacker could use this to cause a denial of service (system hang). \n(CVE-2017-18208)\n\nKefeng Wang discovered that a race condition existed in the memory locking\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service. (CVE-2017-18221)\n\nSilvio Cesare discovered a buffer overwrite existed in the NCPFS\nimplementation in the Linux kernel. A remote attacker controlling a\nmalicious NCPFS server could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2018-8822)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-3.13.0-149-generic 3.13.0-149.199\n linux-image-3.13.0-149-generic-lpae 3.13.0-149.199\n linux-image-3.13.0-149-lowlatency 3.13.0-149.199\n linux-image-3.13.0-149-powerpc-e500 3.13.0-149.199\n linux-image-3.13.0-149-powerpc-e500mc 3.13.0-149.199\n linux-image-3.13.0-149-powerpc-smp 3.13.0-149.199\n linux-image-3.13.0-149-powerpc64-emb 3.13.0-149.199\n linux-image-3.13.0-149-powerpc64-smp 3.13.0-149.199\n linux-image-generic 3.13.0.149.159\n linux-image-generic-lpae 3.13.0.149.159\n linux-image-lowlatency 3.13.0.149.159\n linux-image-powerpc-e500 3.13.0.149.159\n linux-image-powerpc-e500mc 3.13.0.149.159\n linux-image-powerpc-smp 3.13.0.149.159\n linux-image-powerpc64-emb 3.13.0.149.159\n linux-image-powerpc64-smp 3.13.0.149.159\n\nPlease note that fully mitigating CVE-2018-3639 (Spectre Variant 4)\nmay require corresponding processor microcode/firmware updates or,\nin virtual environments, hypervisor updates. On i386 and amd64\narchitectures, the SSBD feature is required to enable the kernel\nmitigations. BIOS vendors will be making updates available for Intel\nprocessors that implement SSBD and Ubuntu is working with Intel to\nprovide future microcode updates. Ubuntu users with a processor from\na different vendor should contact the vendor to identify necessary\nfirmware updates. Ubuntu provided corresponding QEMU updates for users\nof self-hosted virtual environments in USN 3651-1. Ubuntu users in\ncloud environments should contact the cloud provider to confirm that\nthe hypervisor has been updated to expose the new CPU features to\nvirtual machines. \n\nReferences:\n https://usn.ubuntu.com/usn/usn-3655-1\n CVE-2017-12134, CVE-2017-13220, CVE-2017-13305, CVE-2017-17449,\n CVE-2017-18079, CVE-2017-18203, CVE-2017-18204, CVE-2017-18208,\n CVE-2017-18221, CVE-2018-3639, CVE-2018-8822,\n https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Variant4\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/3.13.0-149.199\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-3639"
},
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "PACKETSTORM",
"id": "147721"
},
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "148975"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "150116"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "147742"
},
{
"db": "PACKETSTORM",
"id": "148506"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
},
{
"db": "PACKETSTORM",
"id": "149127"
},
{
"db": "PACKETSTORM",
"id": "147784"
}
],
"trust": 3.42
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-133670",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-133670"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-3639",
"trust": 3.0
},
{
"db": "USCERT",
"id": "TA18-141A",
"trust": 1.9
},
{
"db": "CERT/CC",
"id": "VU#180049",
"trust": 1.9
},
{
"db": "SECTRACK",
"id": "1040949",
"trust": 1.7
},
{
"db": "BID",
"id": "104232",
"trust": 1.7
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2020/06/10/5",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2020/06/10/1",
"trust": 1.1
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2020/06/10/2",
"trust": 1.1
},
{
"db": "LENOVO",
"id": "LEN-22133",
"trust": 1.1
},
{
"db": "EXPLOIT-DB",
"id": "44695",
"trust": 1.1
},
{
"db": "SIEMENS",
"id": "SSA-505225",
"trust": 1.1
},
{
"db": "SIEMENS",
"id": "SSA-268644",
"trust": 1.1
},
{
"db": "SIEMENS",
"id": "SSA-608355",
"trust": 1.1
},
{
"db": "SECTRACK",
"id": "1042004",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#584653",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2018-13391",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "147762",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "147873",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "150073",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "148699",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "147742",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "149127",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "147752",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "147721",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "148975",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "148507",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "148581",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148151",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147743",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148318",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148731",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148817",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150097",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147932",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148484",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150076",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147839",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147749",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148324",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147769",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147746",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147765",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147748",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147770",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147754",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147756",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147931",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148323",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147751",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147747",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147764",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147755",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147763",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148656",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148330",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147744",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150077",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147779",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147734",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147750",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148370",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147767",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147719",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150090",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147737",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147796",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147720",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "149390",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148614",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147738",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148818",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150096",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147745",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147753",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148751",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147780",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148842",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147733",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147778",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147758",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147866",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147740",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147757",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147741",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150079",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150078",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148853",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147735",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147766",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148695",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147938",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147933",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147760",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150075",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150095",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "151288",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150074",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147736",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147761",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "152767",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148317",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147904",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147759",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147930",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147739",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147851",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147934",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-133670",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "147784",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "150116",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "148506",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "PACKETSTORM",
"id": "147721"
},
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "148975"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "147784"
},
{
"db": "PACKETSTORM",
"id": "150116"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "147742"
},
{
"db": "PACKETSTORM",
"id": "148506"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
},
{
"db": "PACKETSTORM",
"id": "149127"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"id": "VAR-201805-0963",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
}
],
"trust": 1.3987851138095238
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-13391"
}
]
},
"last_update_date": "2025-12-22T21:34:12.325000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patches for multiple CPUHardware information disclosure vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/134555"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-13391"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-203",
"trust": 1.1
},
{
"problemtype": "CWE-200",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html"
},
{
"trust": 1.9,
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
},
{
"trust": 1.9,
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
},
{
"trust": 1.9,
"url": "https://www.us-cert.gov/ncas/alerts/ta18-141a"
},
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel"
},
{
"trust": 1.6,
"url": "https://support.apple.com//ht208394"
},
{
"trust": 1.6,
"url": "http://www.dell.com/support/speculative-store-bypass"
},
{
"trust": 1.5,
"url": "https://access.redhat.com/security/vulnerabilities/ssbd"
},
{
"trust": 1.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-3639"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:1656"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:1675"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:1688"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:1711"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:2171"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:2172"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:2258"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2018:3396"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/104232"
},
{
"trust": 1.1,
"url": "https://seclists.org/bugtraq/2019/jun/36"
},
{
"trust": 1.1,
"url": "https://www.kb.cert.org/vuls/id/180049"
},
{
"trust": 1.1,
"url": "http://support.lenovo.com/us/en/solutions/len-22133"
},
{
"trust": 1.1,
"url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html"
},
{
"trust": 1.1,
"url": "http://xenbits.xen.org/xsa/advisory-263.html"
},
{
"trust": 1.1,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"trust": 1.1,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
},
{
"trust": 1.1,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
},
{
"trust": 1.1,
"url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0"
},
{
"trust": 1.1,
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787"
},
{
"trust": 1.1,
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180012"
},
{
"trust": 1.1,
"url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0004"
},
{
"trust": 1.1,
"url": "https://security.netapp.com/advisory/ntap-20180521-0001/"
},
{
"trust": 1.1,
"url": "https://support.citrix.com/article/ctx235225"
},
{
"trust": 1.1,
"url": "https://support.oracle.com/knowledge/sun%20microsystems/2481872_1.html"
},
{
"trust": 1.1,
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"trust": 1.1,
"url": "https://www.synology.com/support/security/synology_sa_18_23"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4210"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2018/dsa-4273"
},
{
"trust": 1.1,
"url": "https://www.exploit-db.com/exploits/44695/"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/2"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/5"
},
{
"trust": 1.1,
"url": "http://www.openwall.com/lists/oss-security/2020/06/10/1"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1629"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1630"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1632"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1633"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1635"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1636"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1637"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1638"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1639"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1640"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1641"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1642"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1643"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1644"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1645"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1646"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1647"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1648"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1649"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1650"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1651"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1652"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1653"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1654"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1655"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1657"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1658"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1659"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1660"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1661"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1662"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1663"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1664"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1665"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1666"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1667"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1668"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1669"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1674"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1676"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1686"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1689"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1690"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1696"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1710"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1737"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1738"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1826"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1854"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1965"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1967"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:1997"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2001"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2003"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2006"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2060"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2161"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2162"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2164"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2216"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2228"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2246"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2250"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2289"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2309"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2328"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2363"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2364"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2387"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2394"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2396"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:2948"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3397"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3398"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3399"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3400"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3401"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3402"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3407"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3423"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3424"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2018:3425"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2019:0148"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2019:1046"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1040949"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1042004"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3651-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3652-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3653-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3653-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3654-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3654-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3655-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3655-2/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3679-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3680-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3756-1/"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/3777-3/"
},
{
"trust": 1.0,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4"
},
{
"trust": 1.0,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03850en_us"
},
{
"trust": 0.8,
"url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution"
},
{
"trust": 0.8,
"url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf"
},
{
"trust": 0.8,
"url": "https://www.kb.cert.org/vuls/id/584653"
},
{
"trust": 0.8,
"url": "http://cwe.mitre.org/data/definitions/208.html"
},
{
"trust": 0.8,
"url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf"
},
{
"trust": 0.8,
"url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf"
},
{
"trust": 0.8,
"url": "https://fortiguard.com/psirt/fg-ir-18-002"
},
{
"trust": 0.8,
"url": "https://support.hp.com/us-en/document/c06001626"
},
{
"trust": 0.8,
"url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/"
},
{
"trust": 0.8,
"url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/"
},
{
"trust": 0.8,
"url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution"
},
{
"trust": 0.8,
"url": "https://www.suse.com/support/kb/doc/?id=7022937"
},
{
"trust": 0.8,
"url": "https://www.synology.com/en-global/support/security/synology_sa_18_23"
},
{
"trust": 0.8,
"url": "https://kb.vmware.com/s/article/54951"
},
{
"trust": 0.8,
"url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/"
},
{
"trust": 0.8,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/cve-2018-3639"
},
{
"trust": 0.8,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.6,
"url": "https://securitytracker.com/id/1040949"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-3640"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-3646"
},
{
"trust": 0.1,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03850en_us"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1009.9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1008.8"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-22.24"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1006.9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1012.12"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/usn/usn-3652-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1010.10"
},
{
"trust": 0.1,
"url": "https://security-tracker.debian.org/tracker/intel-microcode"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12134"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-13220"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8822"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18079"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/usn/usn-3655-1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18204"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18203"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18208"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/3.13.0-149.199"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-18221"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-13305"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-17449"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12618"
},
{
"trust": 0.1,
"url": "https://support.apple.com/kb/ht201222"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4203"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4336"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4334"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4338"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4308"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4332"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4326"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4153"
},
{
"trust": 0.1,
"url": "https://support.apple.com/downloads/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4340"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4304"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4126"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4324"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4331"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-5334"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4310"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-1777"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4295"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-5333"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4333"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4341"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-3194"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4321"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-4337"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-12613"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-14106"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14106"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/usn/usn-3756-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180807a.0ubuntu0.16.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180807a.0ubuntu0.18.04.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20180807a.0ubuntu0.14.04.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "PACKETSTORM",
"id": "147721"
},
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "148975"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "147784"
},
{
"db": "PACKETSTORM",
"id": "150116"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "147742"
},
{
"db": "PACKETSTORM",
"id": "148506"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
},
{
"db": "PACKETSTORM",
"id": "149127"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#180049"
},
{
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"db": "VULHUB",
"id": "VHN-133670"
},
{
"db": "PACKETSTORM",
"id": "147721"
},
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "148975"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "147784"
},
{
"db": "PACKETSTORM",
"id": "150116"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "147742"
},
{
"db": "PACKETSTORM",
"id": "148506"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
},
{
"db": "PACKETSTORM",
"id": "149127"
},
{
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-21T00:00:00",
"db": "CERT/CC",
"id": "VU#180049"
},
{
"date": "2018-07-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"date": "2018-05-22T00:00:00",
"db": "VULHUB",
"id": "VHN-133670"
},
{
"date": "2018-05-21T15:16:00",
"db": "PACKETSTORM",
"id": "147721"
},
{
"date": "2018-05-24T18:33:59",
"db": "PACKETSTORM",
"id": "147873"
},
{
"date": "2018-08-17T17:42:14",
"db": "PACKETSTORM",
"id": "148975"
},
{
"date": "2018-05-23T07:03:03",
"db": "PACKETSTORM",
"id": "147762"
},
{
"date": "2018-07-11T22:06:54",
"db": "PACKETSTORM",
"id": "148507"
},
{
"date": "2018-05-23T07:12:14",
"db": "PACKETSTORM",
"id": "147784"
},
{
"date": "2018-10-31T16:10:50",
"db": "PACKETSTORM",
"id": "150116"
},
{
"date": "2018-05-23T07:00:14",
"db": "PACKETSTORM",
"id": "147752"
},
{
"date": "2018-05-23T06:56:36",
"db": "PACKETSTORM",
"id": "147742"
},
{
"date": "2018-07-11T22:06:47",
"db": "PACKETSTORM",
"id": "148506"
},
{
"date": "2018-10-31T01:13:10",
"db": "PACKETSTORM",
"id": "150073"
},
{
"date": "2018-07-26T00:00:01",
"db": "PACKETSTORM",
"id": "148699"
},
{
"date": "2018-08-28T17:19:20",
"db": "PACKETSTORM",
"id": "149127"
},
{
"date": "2018-05-22T12:29:00.250000",
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-06-19T00:00:00",
"db": "CERT/CC",
"id": "VU#180049"
},
{
"date": "2018-07-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-13391"
},
{
"date": "2020-09-02T00:00:00",
"db": "VULHUB",
"id": "VHN-133670"
},
{
"date": "2024-11-21T04:05:48.867000",
"db": "NVD",
"id": "CVE-2018-3639"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "PACKETSTORM",
"id": "147721"
},
{
"db": "PACKETSTORM",
"id": "147784"
},
{
"db": "PACKETSTORM",
"id": "149127"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks",
"sources": [
{
"db": "CERT/CC",
"id": "VU#180049"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "bypass",
"sources": [
{
"db": "PACKETSTORM",
"id": "147873"
},
{
"db": "PACKETSTORM",
"id": "147762"
},
{
"db": "PACKETSTORM",
"id": "148507"
},
{
"db": "PACKETSTORM",
"id": "147752"
},
{
"db": "PACKETSTORM",
"id": "150073"
},
{
"db": "PACKETSTORM",
"id": "148699"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.